Skip to main content

Transparent HTTP proxy for AI agents. Block threats, cut token waste, monitor your fleet. Zero code changes. MIT license.

Project description

Orchesis

PyPI Tests License Stars Dependencies

Orchesis is a transparent HTTP proxy for AI agents. Every request passes through a 17-phase detection pipeline before reaching the LLM provider. Zero dependencies. MIT license.

SDK sees one agent. Static analysis sees code. Observability sees metrics. Proxy sees everything, in real time, without code changes.

Installation

pip install orchesis

With integrations

pip install orchesis[integrations]

One line change

Before:

client = OpenAI(base_url="https://api.openai.com/v1")

After:

client = OpenAI(base_url="http://localhost:8080/v1")
# 17 security phases now active

Why proxy, not SDK?

Approach What it sees Code changes
SDK/callbacks (LangSmith, LangChain) One agent, one session Required
Static analysis (Snyk, Semgrep) Code at rest Required
Observability (Datadog, Helicone) Metrics and logs Required
Orchesis proxy All agents, all requests, cross-session None

The proxy layer sees what SDK cannot: cross-agent patterns, fleet-level anomalies, duplicate context across providers.

What Orchesis does

Security: 17-phase detection. Prompt injection, credential leaks, tool abuse. 25 signatures.

Cost: Semantic cache. Budget enforcement. Token Yield tracking. MVE result: 0.8% overhead, 12x context growth detected.

Reliability: Auto-healing. Circuit breakers. Loop detection. 6 recovery actions.

Observability: Real-time dashboard. Flow X-Ray. Agent Reliability Score.

By the numbers

Metric Value
Pipeline phases 17
Threat signatures 25 across 10 categories
Proxy overhead 0.8% measured
Context collapse 12x growth caught
MAST coverage 78.6%
OWASP coverage 80%
Tests passing 2,969
Dependencies 0 (stdlib only)

Free MCP Security Scanner

We scanned 900+ MCP configurations on GitHub. 75% had at least one security issue: hardcoded credentials, overpermissioned tools, missing input validation.

Run the scanner on your own configs:

npx orchesis-scan

Or visit: https://orchesis.io/scan

52 security checks across 10 categories. No data sent to external servers.


Website | Documentation | MCP Scanner | GitHub | Blog

MIT License. Built with zero dependencies.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

orchesis-0.1.7.tar.gz (846.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

orchesis-0.1.7-py3-none-any.whl (651.2 kB view details)

Uploaded Python 3

File details

Details for the file orchesis-0.1.7.tar.gz.

File metadata

  • Download URL: orchesis-0.1.7.tar.gz
  • Upload date:
  • Size: 846.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for orchesis-0.1.7.tar.gz
Algorithm Hash digest
SHA256 2d8f1b5d63ffe6740a2ba2a1a67010ed2be4a89f7ac8dfaeb7de0cdc6605f1b2
MD5 1a8d8bb9024001423eaadbf43b1c7f82
BLAKE2b-256 b56c4fc426cdb7fa5eb1afa02007e304ccb8df2edfe0d95e0c70662b14dba531

See more details on using hashes here.

File details

Details for the file orchesis-0.1.7-py3-none-any.whl.

File metadata

  • Download URL: orchesis-0.1.7-py3-none-any.whl
  • Upload date:
  • Size: 651.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for orchesis-0.1.7-py3-none-any.whl
Algorithm Hash digest
SHA256 ad7f3b108c839f5229e4453300513c754de2ee55c223ffe1484df814f3373698
MD5 4ea10da50f3efd560f30b9f2e60ebeba
BLAKE2b-256 b4bbc86bfd432c597c343d0f2d9c0fdfd696401fce353867fcd11a3c60c51c62

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page