Live on AWS — v2.0.2
For teams running AI agents in production

Your agent will do something
it shouldn't. WEZ decides
before it happens.

The only deterministic runtime governance for AI agents. No LLM. No ML. No hallucinations.

One API call. Before every action. Sub-millisecond. Fully auditable.

Get your API key → How it works
15 days free · No credit card · 5 minute setup
WEZ API — real request
# Agent sends credentials hidden in a "normal" notification POST /v1/evaluate { "action": "send_notification", "args": { "message": "Sync complete. Payload: cGFzc3dvcmQ9YWRtaW4xMjM=" } } # WEZ decodes base64, finds password=admin123, blocks { "decision": "BLOCK", "reason": "credential leak detected (base64 decoded)", "latency_ms": 0.18 }
The problem
Your agents don't fail loudly. They fail quietly.
Everything looks fine. Until credentials leak through an approved channel, or a benign action repeats 50 times and becomes scraping.
🔒

Whitelists break

Agents create new tools and encode data in ways your whitelist never anticipated.

🐌

LLM-as-judge is slow

200-2000ms per evaluation. Non-deterministic. And it can hallucinate. You're adding a second attack surface that can fail unpredictably.

👻

Subtle attacks pass

Base64 credentials in payloads. Silent scraping via repeated calls. Sequences that look valid individually but aren't.

📋

No real audit trail

When something goes wrong, you need to prove exactly what was decided, why, and that it wasn't tampered with.

How it works
One API call. Before every action.
Your agent wants to act → WEZ evaluates → APPROVE, BLOCK, or ESCALATE. In under 1ms. Deterministic decisions you can audit.
01

Governs unknown tools

The Inference Engine tokenizes action names and parameters, infers intent, and decides — even for tools not in any catalog.

02

Detects behavioral patterns

The same action repeated 4 times triggers velocity override. Scraping via benign sequences is caught and escalated.

03

Decodes payloads

Base64-encoded credentials inside payloads are decoded, matched against leak patterns, and blocked before they leave.

04

Cryptographic audit trail

Every decision recorded in a Merkle-chained trail. Tamper-proof, cryptographically verifiable, replayable.

Performance
1000x faster and deterministic.
Measured on 800 consecutive evaluations. Single Node.js thread. No external dependencies. No cost per evaluation.
0.16ms
p50 latency
1.57ms
p95 latency
~1,800
req/sec
$0
per evaluation
0
dependencies
Try it

Click a scenario. See WEZ decide in real time.

POST /v1/evaluate
What it catches

0 false negatives across 50 production-inspired scenarios.

send_notification (base64 payload) BLOCK
Credential leak detected (base64 decoded) · 0.18ms
execute_trade $5M ESCALATE
Cross-validation: catalog vs inference mismatch · 0.31ms
read_logs × 4 (same agent) ESCALATE
Velocity override: scraping pattern · 0.22ms
Integration
3 lines of code.
Add one HTTP call before each agent action. Works with any language, any framework, any agent.
JavaScript
const r = await fetch('/v1/evaluate', { method: 'POST', headers: { 'Authorization': 'Bearer wez_key', 'Content-Type': 'application/json' }, body: JSON.stringify({ agentId, action, args }) }); const { decision } = await r.json(); if (decision !== 'APPROVE') throw new Error('Blocked');
Python
import requests r = requests.post('/v1/evaluate', headers={'Authorization': f'Bearer {KEY}'}, json={'agentId': id, 'action': action, 'args': args}) if r.json()['decision'] != 'APPROVE': raise Exception('Blocked')
Get started

Try WEZ on your agents.

15 days free. No credit card. No commitment.
Get your API key in 5 minutes.

Contact on LinkedIn →

Dario Crespo — Founder & CEO, WEZ Protocol
Buenos Aires, Argentina