ShieldProbe Defend

Protected the moment we find it.

Defend takes the exploits Assess finds and neutralizes them at your middleware layer in 30ms — as a Generative Counter Exploit (GCE), not a generic WAF signature. No code changes. No tuning. No 30–90 day exposure window while developers work.

SQLi
30ms
Traffic
Threats
|
Safe
Generative Counter Exploits

A GCE is not a WAF signature. It's a targeted mitigation.

When Assess confirms an exploit against your app, Defend generates a Counter Exploit: a piece of code that intercepts the specific request pattern that broke your app and neutralizes it — using one of six mitigation strategies, chosen by vulnerability type.

Rewrite

Remap the request before it hits your handler. Example: an untrusted client-sent price is replaced with the server's canonical price.

Block

Drop the exploit outright when no safe reinterpretation exists. Example: a known-malicious payload against a path that has no legitimate use.

Sanitize

Clean the input. Example: a withdraw form takes a -500 amount; the GCE coerces it to a positive integer before the handler sees it.

Validate

Enforce stricter input constraints than the app itself does. Example: a date field that should be ISO-8601 rejects SQL fragments.

Redirect

Reroute the request to a safe path or a canonical endpoint. Example: a vulnerable legacy route is redirected to its v2 equivalent.

Header inject

Add the protective header the app forgot. Example: missing CSRF, Content-Security-Policy, or X-Frame-Options.

Case · Business-logic flaw

Negative numbers, a withdraw form, and one line of GCE

A real finding from a banking application. The kind of flaw scanners systematically miss and WAF signatures can't describe.

Assess finds it
// Attacker submits:
POST /api/withdraw
Authorization: Bearer <victim-token>
Content-Type: application/json

{ "account": "...",
  "amount": -50000 }

// Server trusts the sign.
// balance += amount  →  balance increases.
// Attacker just "withdrew" -$50K.
Status: 200 OK

Scanner response: HTTP 200, valid JSON, nothing to flag. No CVE matches. The signature layer has no concept of "negative withdrawal is a fraud vector."

Defend neutralizes it (GCE — Sanitize)
// GCE-2847 · middleware · 30ms
defend.intercept('POST /api/withdraw', (req) => {
  if (req.body.amount < 0) {
    req.body.amount = Math.abs(req.body.amount);
  }
  return req;
});

// Attacker sees:
Status: 200 OK  // withdraw of +$50K,
                // denied by insufficient-funds.
// Attack dead.

Three lines of targeted code. Generated from the exact exploit payload. Shipped to your middleware in 30ms. Zero impact on any other route, user, or legitimate request.

Where Defend actually runs

No network proxy. No CDN dependency. No tuning phase.

SDK at the middleware layer

Defend installs as an SDK inside your application's request pipeline. Not a network proxy, not a sidecar, not a CDN rule. It intercepts both external (inbound HTTP) and internal (function-to-function) calls.

Language-agnostic at the SDK level

The SDK ships for pretty much any language you run in production. Node.js, Python, Go, Java, Ruby, .NET. GCEs are generated per-language at the middleware hook.

30 ms added latency — benchmarked at 27 ms

Standard WAFs add 5–50 ms and a signature-tuning backlog. Defend adds a single-digit millisecond budget per request because the GCE only runs against the specific routes it was generated for.

Also exports as WAF rules

If you want defense-in-depth at the edge too, Defend emits equivalent rules for Cloudflare, AWS WAF, and Akamai. The SDK is the primary; the edge rules are a bridge.

One-click enable / one-click disable

Every GCE is versioned and toggleable in the dashboard. Roll forward when a finding lands, roll back instantly if a deploy ever misbehaves.
shieldprobe-defend.log
09:42:17THREATPOST/api/withdraw {amount: -50000}
09:42:17GCE-MATCHBusiness-logic · negative-amount sanitize rule
09:42:17SANITIZEamount: -50000 → 50000 (normalized)
09:42:17SAFE handler rejected on insufficient-funds • 27ms

What Defend is not

Scope discipline. Here's what we don't claim.

Not a WAF signature set

GCEs are generated from the specific exploits Assess ran, not a generic rule library.

Not a replacement for code fixes

GCEs buy time. Architecturally, your team still owns the underlying fix — that's where comes in.

Not an always-on blocker

Every GCE is scoped to a specific route and payload shape. It doesn't re-inspect every request against a thousand rules.

Not a CDN or reverse proxy

It runs in your application process, not in front of it. No traffic redirection, no TLS terminator in the middle.

What GCE neutralizes — and what routes to Fix

Honesty about the seam. Defend covers the majority of findings; Fix covers the rest.

Defend handles at runtime
  • Business-logic flaws (price tampering, negative amounts, coupon stacking)
  • Injection (SQLi, XSS, SSRF, command injection, path traversal)
  • Broken auth (weak sessions, missing CSRF, MFA gaps, cookie flags)
  • API authz (IDOR, BOLA, mass assignment, excessive data exposure)
  • Missing security headers (CSP, X-Frame-Options, HSTS)
  • Rate-limit evasion on sensitive endpoints
Fix handles in code
  • Architectural rewrites (redesigning a whole auth flow)
  • Cryptographic algorithm changes (moving off a weak hash)
  • Vulnerable dependency upgrades
  • Schema / data-model changes
  • Anything the GCE can only mask, not cure

When you reach for Defend

The zero-day window

A critical finding lands. Devs need weeks to ship the architectural fix. GCE closes the exposure in 30 ms.

Vulnerable third-party dependency

Library has a known CVE, upgrade breaks compatibility. GCE neutralizes the specific call path until upgrade lands.

Legacy systems you can't easily touch

Platform you inherited, team that's moved on. Defend protects at the middleware layer without requiring a release.

Auditor-window mitigation

Audit finding, 30-day remediation SLA. Defend is active within hours and evidenced in the Assess replay stream.

Close the 30–90 day exposure window

Defend ships bundled with . Every finding becomes a GCE the moment the report lands. Code-level remediation rides alongside in .