OpenScorpion puts rules and routing between your agents and reality.
OpenScorpion is an intelligent enforcement point and router for agentic and LLM workloads. It combines Adaptive Semantic Routing, with an Agentic Compliance and Policy Governor, so every request is classified, routed to the best provider, and blocked or redacted when it should be.
It sits as a gateway, sidecar, or shared service. It speaks HTTP, and it does not require you to rewrite your agents just to behave.
What OpenScorpion does
Adaptive Semantic Routing
Classifies request intent, sensitivity, and domain, then selects the provider, model, and toolchain that best fits the job, without trusting the agent to behave.
Policy governance, at the choke point
Enforces policy before model invocation and before tool execution, including deny, allow, redact, sandbox, step up approval, and forced audit.
Evidence, audit, and provenance
Stores prompts, decisions, citations, tool calls, hashes, and policy traces. When Legal asks, you can answer, instead of sweating quietly.
Cost, quality, and risk optimisation
Routes low risk tasks to cheaper models, routes high stakes tasks to stronger models, and keeps regulated data on prem when needed.
Tool access control for agents
Applies capability boundaries to tools, connectors, and actions, based on identity, intent, and context, so agents cannot casually discover new ways to misbehave.
How it works
Step 1, Intercept
OpenScorpion receives the request as a gateway call, sidecar call, or shared service call, and attaches identity and context.
Step 2, Classify
ASR assigns intent, sensitivity, domain, and risk. It can use heuristics, embeddings, rules, or a classifier model, depending on your appetite for complexity.
Step 3, Enforce
APCG evaluates policy, applies controls, and returns a verdict. The router only proceeds when policy says it can, and only within the authorised constraints.
Step 4, Route and log
OpenScorpion selects provider and model, optionally applies redaction, invokes the model or tool, and writes a complete decision trace with evidence.
Live demo
The demo demonstrates enforcement and routing decisions. In production, the same logic runs server side, and writes an audit trail to your chosen store.
Reference architecture
Trust, safety, and boring but necessary assurances
Enforcement before execution
Policies evaluate intent, identity, region, data type, and requested tooling. OpenScorpion blocks or constrains requests before any model call and before any tool action.
Audit trail that survives scrutiny
Decision traces include policy rationale, selected routes, redaction actions, and hashes. You can replay, investigate, and prove what happened.
Designed for multi provider reality
You can run local models for sensitive workloads, and use cloud models for high quality outputs, with consistent enforcement in one place.
Request a briefing
What you get
A reference deployment pattern, a policy catalogue starter kit, and an integration approach for your agent framework and tool ecosystem. You can also receive a short technical deep dive that covers routing logic, policy evaluation order, audit schema, and operational metrics.