Risk dashboard
Weighted risk score 0-100 per agent and per organization. Severity breakdown, trend charts, and critical findings without hunting.
Three layers. Three board-level questions. Every AI system in your organisation, from the same console.
Gateway Architecture
Identity, policy, spend, data controls, and signed evidence sit outside the agent runtime.
HikmaAI Intelligent Gateway
What The Engineering Team Gets On Day One
01
Incident response has one place to look - across all agents, tools, and tenants.
02
Secrets exist in exactly one container. Never in agent memory, logs, or stack traces.
03
The gateway returns 429 after spend limits are reached - before the budget burns.
04
LLM01 prompt injection, LLM06 PII disclosure, LLM08 excessive agency, LLM10 unbounded spend.
05
LangGraph today, OpenClaw now, whatever ships next. Your security posture outlives the choice.
06
EU AI Act, SOC 2, and ISO 42001 conversations get shorter when every action is already logged.
Observe
Continuous coverage with audit-grade evidence.
Weighted risk score 0-100 per agent and per organization. Severity breakdown, trend charts, and critical findings without hunting.
Every action logged with actor, timestamp, source IP, and change performed. Ed25519-signed CSV exports for record-keeping.
Assessment progress, critical findings, and compliance drift surfaced in-platform and via webhook.
Board-ready and regulator-ready exports for every assessment, with signed audit logs attached as evidence.
Control
Automated red-teaming, compliance, and code-level audit.
Active attacks tailored to your agent's actual behavior, not a static checklist of generic prompts.
Coverage across prompt injection, jailbreaking, data leakage, insecure output, excessive agency, and supply chain.
Article-by-article evaluation including Article 15 enhanced pillars: accuracy, robustness, and explainability.
Tool enumeration, permission analysis, and input validation for MCP servers, Git URLs, and ZIP uploads.
Govern
RBAC, tenant isolation, programmatic control.
Admin, Member, and read-only roles separate security, platform, and compliance duties. Every privileged action is logged.
Scoped API keys for programmatic integration. Pin keys to specific agents; revoke without touching user auth.
Risk classification, lifecycle stage, and regulatory context attached to every agent and reflected in every report.
Ed25519-signed bundles for regulators and auditors. Tamper-evident and verifiable without the platform.
The Intelligent Gateway
The gateway is the only thing the agent can talk to. Everything else is declared, allow-listed, and audited.
Zero Production Change
One engineer. Works with every framework you already operate.
Installs on your hardware or private cloud. Your data never leaves your perimeter. Air-gapped. Zero telemetry.
Cloud-hosted. Zero infrastructure to manage. Your deployment choice does not change the commercial value of HikmaAI.
Deploy In 5 Steps
Step 01
One binary, one YAML. Runs as a Kubernetes sidecar or Deployment, standalone Docker container, or transparent proxy.
Step 02
The agent calls the gateway instead of the provider directly. It holds no token and knows no upstream URL.
Step 03
One YAML block per agent: providers, tool allow-list, cascade depth, budget tier, and attestation key.
Step 04
Baseline in alert mode, then promote controls to enforce in a shadow-then-flip motion.
Step 05
Stream JSON logs to your SIEM. Export OTel spans. Rotate secrets without restarting pods.
Gateway latency
Per call
Attack vectors
Tested continuously
Deployment time
One engineer
No code changes
In your systems
& multimodal
By default
Native languages
ML classifiers
Aligned to
Request Demo
Request a 30-minute demo. We walk your team through the threat model for your specific agentic footprint - and what controlling it looks like.