threat-scan --target web --agent autonomous --vectors 8 --mode realtime
v2.0 — 8 threat vectors · WebSocket real-time scanning

Secure
AI agents
from the web.

Guni sits between your agent and every page it visits.
Detects prompt injection, phishing, clickjacking,
and goal hijacking — before execution. 0.001s.

Early access — limited spots open
✓ You're on the list. We'll reach out within 48 hours.
No spam. Free tier always included.
0
Threats blocked
0
Pages scanned
0.001s
Avg detection
8
Threat vectors
guni — live threat analysis output
What Guni detects

8 threat vectors.
One security layer.

Every page your agent visits gets a full multi-vector scan in under 1 millisecond.

01
Prompt Injection
Visible and CSS-hidden instructions overriding agent goals — including reworded attacks no keyword list catches.
Weight 30
02
Phishing Forms
Credential-harvesting forms, external URL submissions, urgency language designed to trick agents.
Weight 40
03
UI Deception
Deceptive button text, fake urgency, hidden clickable elements visible to agents but not humans.
Weight 25
04
Malicious Scripts
eval(), external fetch, cookie access — JavaScript patterns that exfiltrate agent session data.
Weight 20
05
Goal Hijacking
Validates every page against the agent's declared objective. Blocks mid-session steering attempts.
Weight 35
06
Clickjacking
Invisible iframe overlays and transparent fixed elements hijacking agent clicks and actions.
Weight 30
07
CSRF & Token Theft
Scripts harvesting auth tokens, forms without CSRF protection, hidden inputs with sensitive values.
Weight 35
08
Open Redirects
Meta refresh redirects, JS location hijacks, redirect parameters sending agents to adversarial pages.
Weight 20

How it works

Two layers.
Zero compromises.

Fast heuristics catch known attacks instantly. LLM reasoning catches everything else.

01 — PARSE
DOM normalization
Raw HTML parsed. Visible text, hidden elements, forms, scripts extracted in parallel.
02 — DETECT
8-vector heuristics
All 8 detectors run simultaneously. Known attacks caught in ~0.001s at zero API cost.
03 — REASON
LLM intent analysis
When heuristics flag something, Claude reasons about intent — catching novel reworded attacks.
04 — DECIDE
Policy enforcement
Risk ≥ 70 → BLOCK. 40–69 → CONFIRM. < 40 → ALLOW. Full evidence logged.

Pricing

Start free.
Scale when ready.

The core is open source and free forever. Pay only for the hosted API and LLM layer.

Heuristic
$0 /mo
Forever free · Self-hosted
Full 8-vector detection
REST API (self-hosted)
pip install guni
Audit log
Open source MIT
View on GitHub
MOST POPULAR
Starter
$9 /mo
Early access — price locked in forever
Everything in Heuristic
LLM reasoning layer
1,000 scans/month
Hosted API + dashboard
Real-time WebSocket scanning
Email support
Join waitlist
Price locks at $9 if you join waitlist now.
Pro
$29 /mo
Coming soon
10,000 scans/month
Custom threat rules
Priority support
Advanced analytics
SLA guarantee
Get notified
What builders are saying
"We were shipping a browser agent for automated procurement and never thought about what happens when it hits a malicious page. Guni is the thing we didn't know we needed."
— Founder, B2B SaaS startup
"The LLM reasoning layer caught a reworded injection attack in our staging environment that no WAF would have flagged. Genuinely impressive."
— Senior engineer, AI infrastructure team
"Three lines of code and my LangChain agent has a full security layer. 0.001s detection time. This is exactly what the agentic ecosystem needs."
— ML engineer, agent tooling startup

Your agent is browsing
an adversarial web.

Every page it visits could contain hidden instructions.
Don't ship without a security layer.

Join the waitlist
✓ You're on the list.
No spam. Free tier always included.