Enforcement
before every agent
execution on Solana
Agentic capital is already executing on-chain. Every existing guardrail is advisory. Agents can override them. prflght puts mandatory enforcement between intent and execution: simulation, policy checks, and on-chain attestation.
Agentic capital has the rails. It has the agents. The one thing missing: mandatory enforcement before execution. Every guardrail today is advisory. Your agent builds a swap, a perp, a treasury transfer. Nothing mandatory stands between intent and execution. prflght changes that.
Enforcement in three steps
Build
Your agent, vault, or treasury bot constructs a draft transaction: a swap, perp order, or stablecoin transfer. Nothing changes in how you build.
Any existing agent framework. Any wallet. Any execution flow.
Check
One SDK call. The risk engine simulates the transaction, evaluates your policies, and checks live protocol health.
Returns a cryptographically signed attestation in under 100ms.
Enforce
The on-chain program verifies the attestation before any instruction executes. Without a valid attestation, nothing executes.
Blocked transactions never reach the network.
On-chain program verifies Ed25519 attestation signature, TTL, policy hash, then lets remaining instructions execute.
Everything the firewall needs
Off-chain risk engine + on-chain attestation + policy DSL + protocol health registry. The full enforcement stack.
Transaction Simulation
Risk layer 1Full off-chain simulation before signing. Catch reverts, unexpected token outputs, and compute issues. Your agent never sends a transaction that would fail or succeed badly.
Policy Engine
Risk layer 2Programmable, mandatory rules: slippage bounds, max notional, program allowlist and denylist. Not a dashboard. Not a suggestion. Enforcement your agent cannot bypass.
Protocol Health Registry
Risk layer 3Don't let your agent trade on a degraded venue. Real-time health data for Orca, Drift, Kamino. Execution is automatically blocked when protocols enter anomalous state.
On-chain Attestation
EnforcementEd25519-signed, TTL-bound attestation verified by a Solana program before execution. Cryptographically unfakeable. Zero trust assumptions on the agent.
What unguarded agents execute.
These are not edge cases. They are the default behavior of autonomous agents running without a mandatory enforcement layer.
Two lines to integrate
TypeScript SDK wraps the Firewall API. Drop it into your existing agent transaction flow.
// Install: npm install @prflght/sdk
import { Firewall } from '@prflght/sdk';
const fw = new Firewall({ apiKey: process.env.PRFLGHT_KEY });
// Check before every transaction
const { decision, attestation } = await fw.check(draftTxBase64)
if (decision === 'Allow') {
const tx = fw.inject(draftTx, attestation)
await sendAndConfirmTransaction(connection, tx)
}
// Blocked transactions never reach the networkBuilt for teams where agents are already live
Not for teams planning to add agents someday. For teams where autonomous execution is already happening. Enforcement is overdue.
Agent Treasury Teams
Your rebalancer doesn't ask for permission. Neither does your trading bot. prflght puts mandatory policy enforcement on every execution without slowing the agent down.
Smart Account Teams
Build agent permissions your users can actually trust. Programmable execution constraints with cryptographic enforcement, not UI warnings they can dismiss.
DeFi Protocols
Agent-driven volume is growing. Accept it with confidence. On-chain verifiable attestations mean execution was policy-checked before it ever reached your protocol.
Request early access
We're working with the first teams to integrate prflght into live agent execution flows: swaps, perps, stablecoin transfers. If you're running autonomous DeFi on Solana, let's talk.