1 / 10
Developer workstation with code on screen

VC pitch

CurtainWall

Encrypted guardrail interceptor for frontier agents.

Local proxy. Encrypted policy checks. Managed enterprise rollout through existing IT controls.

The problem

Plaintext guardrails become attack instructions.

As frontier agents move from chat to execution, guardrails stop being policy docs and become runtime security controls. If the agent can read the rules, it can learn to work around them.

1. Inject

Adversarial prompt asks the agent to reveal or infer the hidden policy.

2. Learn

The agent leaks rules, categories, or threshold behavior.

3. Bypass

The next prompt is optimized around the exposed control.

Thesis

The future of agent security is not just better prompting. It is keeping policy data out of the agent loop.

01

Agents should never see sensitive guardrails.

Policy content is operational knowledge. Once exposed, it can be probed, inferred, and optimized against.

02

Security teams need a separate control plane.

Admins should author and update guardrails without routing rule text through the same agent surface they are trying to constrain.

03

Developers need invisible enforcement.

The workflow should stay the same until a request crosses the policy boundary.

Solution

A local proxy that checks prompts against encrypted guardrails before the agent can use the rulebook against you.

CurtainWall intercepts LLM API calls, embeds the prompt locally, runs encrypted similarity against policy vectors, and blocks violations without revealing the guardrail corpus to the agent.

Key property: no single component sees both the plaintext prompt and the plaintext guardrail.
Agent Claude Code, Codex CLI, Gemini CLI, Cursor, custom agents
API call to localhost:8100
CurtainWall Proxy Local parser, local embedding, encrypted similarity
Encrypted scores only
Vault SecKey holder, score decrypt, RBAC, policy store
PASS / BLOCK / REVIEW
LLM API or refusal Forward only if policy permits

Security model

Information separation is the product.

The proxy protects developer prompts from central collection. The Vault protects guardrail content from the agent. The agent gets a decision, not the rules.

Component Sees prompts Sees guardrails Sees scores Role
Local proxy Yes, plaintext No, encrypted vectors only No, encrypted scores only Intercept and evaluate locally
Vault Never Embeddings only Yes, decrypts Judge, sync, RBAC, policy store
Agent Its own conversation Never Never Receives pass or refusal
Server racks in a data center

Product

Built for managed enterprise rollout, not unmanaged laptops.

0

Agent code changes

Redirect existing Anthropic, OpenAI, and Google endpoints through localhost.

1

Admin control plane

Security teams author guardrails through a web console served by the Vault, outside the agent loop.

N

Managed endpoints

Local proxy runs per workstation, avoiding a central plaintext prompt collector and fitting existing MDM controls.

Why us

CurtainWall sits at the intersection of FHE, agent infrastructure, and enterprise security operations.

FHE-native architecture

Guardrail similarity runs over encrypted vectors using CryptoLab's HEaaN and EVI integration path.

Agent-agnostic wedge

The proxy model works across model providers and agent clients via base URL overrides.

Enterprise deployment shape

Local daemon, Vault, RBAC, MDM rollout, and network hardening map to a real IT buying motion.

The moat is not a better prompt. It is an enforceable architecture that keeps sensitive policy data out of the agent's reach.

Go to market

Start where frontier-agent risk is already budgeted: managed developer endpoints and AI platform teams.

The first buyer is the team already accountable for AI governance, secure SDLC, endpoint controls, and model access. The first wedge is local agent traffic from coding assistants and internal automation agents.

Buyer

CISO, AI platform, DevSecOps, and platform engineering leaders.

Beachhead

Teams using Claude Code, Codex CLI, Gemini CLI, Cursor, or custom MCP-based agents.

Expansion

From developer agents to CI, internal copilots, data workflows, and regulated automation.

Execution plan

Turn a defensible technical wedge into an enterprise security product.

Now

Prototype path

Local proxy, Vault service, provider parsers, encrypted similarity adapter, RBAC, and tests.

Next

Pilot hardening

Admin console, deployment packages, observability, network hardening guides, self-hosted review verification, and false-positive tuning.

Then

Enterprise scale

Windows service support, SIEM integration, audit reports, and policy lifecycle workflows.

The ask

We are looking for design partners and capital to harden the first encrypted guardrail layer for frontier-agent teams.

Design partners

Validate the pain in production-like agent workflows.

Priority: AI platform teams, security teams, and developer organizations already rolling out agentic coding or internal automation.

Investment

Accelerate productization and enterprise delivery.

Funding goes toward package distribution, admin console, deployment hardening, auditability, and customer pilots.

CurtainWall is proprietary enterprise software by CryptoLab Inc.