The Anatomy of Kavach
We combine deterministic blocklists with probabilistic AI reasoning. Here is exactly what happens in the milliseconds between you clicking "Analyze" and getting a verdict.
1. Secure Ingestion
Your URL, text, image, or audio is sent to our Next.js Edge APIs. Requests are instantly filtered by Upstash Redis to block botnets and rate-limit abuse.
1. Secure Ingestion
Your URL, text, image, or audio is sent to our Next.js Edge APIs. Requests are instantly filtered by Upstash Redis to block botnets and rate-limit abuse.
2. Dual-Layer Analysis
URLs are checked against the Google Safe Browsing API. If it's a zero-day threat, text, or media, it is routed to Gemini 2.5 Flash for deep forensic and psychological analysis.
2. Dual-Layer Analysis
URLs are checked against the Google Safe Browsing API. If it's a zero-day threat, text, or media, it is routed to Gemini 2.5 Flash for deep forensic and psychological analysis.
3. Verdict & Threat Logging
A jargon-free verdict is returned to the user in their local language. If a threat is confirmed and consent is given, it is anonymously appended to the Firebase Threat Ledger to protect others.
3. Verdict & Threat Logging
A jargon-free verdict is returned to the user in their local language. If a threat is confirmed and consent is given, it is anonymously appended to the Firebase Threat Ledger to protect others.