85.1% agentic threat detection
across 10 attack categories. 166/166 tests passing.
47 real attack payloads tested against
api.intercis.io
— credential exfiltration, data exfiltration, encoded commands, supply chain attacks, container escape, persistence, and more. 48 deny patterns, zero code changes.
2-minute security validation · 47 attack payloads · 10 threat categories · api.intercis.io · April 8, 2026
✓ Functional checks 166 / 166 passed
Latency benchmark
Cross-continental test: client in US East Coast, proxy in Railway europe-west4. Co-located overhead expected: 50–150ms.
What this validates
The agent SDK client was pointed at api.intercis.io instead of api.anthropic.com. No other changes to the agent codebase.
The rm -rf tool call was blocked before the agent received it — at intercept time, not after execution.
Events are written to an append-only Supabase table by the proxy. The agent process has no write access.
The bash tool was not blanket-blocked. Only commands matching the shell-rm policy were denied. Safe calls passed through unchanged.
Reproduce it yourself
Test scripts at
demo/smoke_test.py,
demo/agent_test.py,
demo/bench_latency.py.
INTERCIS_PROXY_KEY provided during design partner onboarding.
Ready to run this on your agents?
Design partner slots are available. One endpoint change, full governance layer, live in under 10 minutes.
Become a design partnerOr email: sales@intercis.io