← Back

Help Center

full-deploy_ -- Enterprise-grade AI security for agent-to-agent communication.

Getting Started

How do I create my first project?
Sign in and click "New Deployment" on the dashboard. Select your source (Git repo, Docker image, or ZIP upload), configure your environment, and click Deploy. Full Deploy handles provisioning, scaling, and monitoring automatically.
What runtimes are supported?
Full Deploy supports Node.js, Python, Go, Rust, and any Docker container. Runtimes are auto-detected from your project configuration or can be set manually in the deployment settings.
How do I connect my domain?
Go to Project > Settings > Domains and add your custom domain. Full Deploy provisions a TLS certificate automatically via Let's Encrypt. DNS propagation typically completes within minutes.

AI Agent Pipeline

What does the AI pipeline do?
The AI agent pipeline (C-AI, I-AI, S-AI, PI-AI) reviews every communication for prompt injection attacks, data quality issues, and security vulnerabilities. PI-AI runs continuously to block hostile payloads before they reach your agents.
How does the Gateway evaluate requests?
Send a POST to /v1/gateway/evaluate with your payload. The gateway runs policy checks, rate limiting, IP allowlist verification, anomaly detection, and replay prevention. Results include a decision (allow/block/quarantine) and a risk score.
Can I view pipeline results via API?
Yes. Use GET /v1/gateway/audit to retrieve evaluation history with filtering by decision, sender, receiver, and date range. Individual records are available at GET /v1/gateway/audit/{id}.
What are the Gateway reason codes?
Use GET /v1/gateway/explain?code=RF-001 to get human-readable explanations for any of the 10 reason codes. The docs page at /docs lists all codes with descriptions and recommended actions.

Security Features

How does three-factor authentication work?
Full Deploy uses 3FA: password, AIKC (AI Key Card) rotating token, and device verification. AIKC tokens rotate automatically and are managed at /auth/aikc. This provides defence-in-depth against credential compromise.
What is PI-AI?
PI-AI (Prompt Injection AI) is an always-active security layer that screens all data flows for injection attacks, malicious payloads, and virus signatures. It runs as part of every gateway evaluation and cannot be disabled.
How does audit logging work?
Every action is recorded in an immutable audit log backed by PostgreSQL. Access logs via GET /v1/gateway/audit or export as NDJSON via GET /v1/gateway/audit/export. Enterprise plans support configurable retention periods.

API Integration

Where is the API documentation?
Full API reference is available at /docs with all 22 endpoints documented. An OpenAPI 3.1 specification is available at /docs/openapi.yaml for code generation and tooling integration.
How do I authenticate API requests?
Include your API key in the X-API-Key header or use Bearer token authentication with a JWT obtained from /auth/login. Public and Enterprise API keys have different rate limits and capabilities.
Are there webhooks?
Yes. Configure webhook endpoints in your tenant settings. Events are signed with HMAC-SHA256 (X-FullDeploy-Signature-256 header) and include a timestamp for replay protection. Failed deliveries retry 3 times with exponential backoff.

Billing

What plans are available?
Solo at £4.99/$4.99/€4.99 per month for personal projects. Company at £19.99/$19.99/€19.99 per month for teams up to 25. Enterprise at £299/$299/€299 per month with unlimited seats, custom SLAs, and dedicated support.
What are the rate limits per plan?
Solo: 1,000 gateway evaluations per day, 60 API requests per minute. Company: 5,000 evaluations per day, 300 requests per minute. Enterprise: 10,000 evaluations per day with custom limits available.
Is there a free trial?
Yes. New accounts receive a 14-day free trial of the Company plan with full access to the gateway, AI agents, and audit features. No credit card required to start.