Policy-aware
Rules are evaluated against request context, tenant state, identity, risk, region, memory signals, and operational switches.
Security
JWT, API keys, signed links, password gates, Turnstile, WAF readiness, anomaly scoring, immutable audit logs, and tenant isolation.
Rules are evaluated against request context, tenant state, identity, risk, region, memory signals, and operational switches.
Every decision produces click telemetry, route traces, audit events, and analytics-ready metrics.
Designed for Workers, Pages, KV, D1, Durable Objects, R2, Queues, Turnstile, WAF, and future AI Gateway.
n-v.io/security → evaluate(policy) → score(risk) → route(edge) → log(audit)