The Anatomy of Kavach

We combine deterministic blocklists with probabilistic AI reasoning. Here is exactly what happens in the milliseconds between you clicking "Analyze" and getting a verdict.

1

1. Secure Ingestion

Your URL, text, image, or audio is sent to our Next.js Edge APIs. Requests are instantly filtered by Upstash Redis to block botnets and rate-limit abuse.

POST /api/scanRate Limit: OK
2

2. Dual-Layer Analysis

URLs are checked against the Google Safe Browsing API. If it's a zero-day threat, text, or media, it is routed to Gemini 2.5 Flash for deep forensic and psychological analysis.

Gemini 2.5 Flash Engine
Multimodal Context Processing
3

3. Verdict & Threat Logging

A jargon-free verdict is returned to the user in their local language. If a threat is confirmed and consent is given, it is anonymously appended to the Firebase Threat Ledger to protect others.

Critical Threat Caught