Semantic action sitemap
A signed, per-app manifest of which (channel, topic, message-type) triples are authorised for each user intent. Positive-security by default — anything unlisted is denied, no matter what the signature database says.
Modern stacks are WebSocket-first, event-bus-driven, and shot through with embedded AI agents. Traditional WAFs watch HTTP requests that no longer carry the decision — and SOCs pay for it at audit time. WebWall is the runtime security platform for the surface your WAF cannot see, with positive-security policy, ML-assisted detection, and signed audit as first-class primitives.
Deploys inline on MAJA browser isolation · zero-disruption shadow mode · single Rust process · 5 ms p95 per event.
Three cracks your security programme is already paying for — in incident cost, audit cycles, and engineering time spent writing brittle glue between tools that were never designed to cooperate.
Salesforce Lightning, Slack, Teams, Workday, and every trading desk run on long-lived WebSocket sessions and event-bus topics. The HTTP WAF sees the 101 Upgrade, then nothing for the rest of the day.
Embedded LLMs and MCP tool-callers decide which resources to touch based on natural-language intent. Without a semantic notion of authorised action, a single misleading sentence becomes an exfiltration path.
EU AI Act, GDPR, and ISO 27002 demand explainable, replayable, attributable decisions. A blocklist or an SVM margin score cannot answer “why did you allow this?” — which is now the default audit question.
WebWall lifts every frame into a typed semantic graph, runs human-authored policy rules in a forward-chaining reasoner, and emits verdicts with signed PROV-O evidence. In-process, deadline-bounded, composable with ML assistance.
rule "classified payload to non-consented peer"
when /event-kind /ws-frame-sent
/payload-categories contains /pii
/peer !in /consented-peers
then /verdict /block
/explain "pii → unattested peer"
/emit-auditEvery WebSocket frame, event-bus message, MCP call, SSE event, and DOM mutation is lifted into a typed event with provenance: peer DID, CSP origin, subprotocol, payload hash, and consent purpose.
Events enter a session-scoped fact graph keyed by the kyl vocabulary — actor, intent, channel, topic, message-schema. Signed kyl rules fire in a forward-chaining reasoner with a 5 ms deadline and strictest-wins verdict merging.
Allow · rewrite · block · quarantine, inline on the MAJA transport. Every verdict emits a PROV-O audit entry signed with a post-quantum profile — explainable, replayable, admissible.
WebWall is not a feature bag. Every primitive is a direct answer to a specific enterprise gap, and every verdict composes through a single strictest-wins pipeline.
A signed, per-app manifest of which (channel, topic, message-type) triples are authorised for each user intent. Positive-security by default — anything unlisted is denied, no matter what the signature database says.
Rules are human-authorable, machine-validatable kyl documents. Security engineers review them the way DevOps reviews Terraform, with sitemap-diff workflows and signed rule bundles.
Data Privacy Vocabulary classifications on every payload, bound to declared purposes. No classified category crosses a consent boundary without explicit user authorisation — GDPR and EU AI Act, enforced at the byte.
Every verdict carries a post-quantum-signed PROV-O entry with the fact set, rule DID, and reasoning chain. Replayable for incident review; admissible for regulators and internal SOC forensics.
ADL-WAF-class dual-layer anomaly detection (Decision-Tree → SVM) is composable as one rule among many. 99.88% benchmark compatibility without the opacity — explanations survive because ML never owns a verdict.
Cryptographic peer identity via IETF Web Bot Auth, DIDs on channels and messages, and actor classification that distinguishes humans from agents, bots, and scrapers at the first frame.
Each threat is modelled in the WebWall threat ontology and bound to one or more kyl rules. Verdicts merge strictest-wins; every firing is explainable against an external standard.
Positive-security wins adversarial. Negative-security wins benchmarks. WebWall runs both and composes them under a single audit trail.
| Capability | WebWall | Cloudflare / Akamai | ADL-WAF / ML WAF | ceLLMate |
|---|---|---|---|---|
HTTP-request WAF rules Classic path/method/body regex | ||||
WebSocket-frame reasoning Per-frame decisions after the 101 Upgrade | ||||
Event-bus pub/sub enforcement Topic + message-type semantic sitemap | ||||
Indirect prompt-injection defence In-context detection with classifier fallback | ||||
DPV consent & purpose binding Payload classification against session consent | ||||
Signed PROV-O audit trail Replayable, attributable, admissible verdicts | ||||
ML anomaly detection (ADL-WAF class) Decision-Tree anomaly → SVM classification | ||||
Human-authorable policy language Review-gated, diff-able, signed rules | ||||
Browser-isolation integration In-process with DOM-mirror enforcement points | ||||
Web Bot Auth / DID peer identity IETF draft-meunier, cryptographic peer attestation |
Comparison reflects published capabilities as of April 2026. ADL-WAF refers to Nakayiza et al., arXiv:2511.12643, and representative ML-based WAFs. ceLLMate refers to the UCSD semantic action-sitemap research. We track changes and will update.
WebWall is AKIRA, a forward-chaining semantic reasoner, running alongside MAJA, a browser-isolation substrate that streams DOM mutations and duplex frames between a server-side Chromium and the client. Reasoning and enforcement sit on the same hot path, so verdicts land before a byte reaches the user.
Every verdict is signed evidence. Every rule is a reviewable document. Every ML model carries a training-data attestation. That is what modern regulation demands — and the bar the next generation of enterprise security platforms has to meet.
Every ML decision is tied to a model DID, a training-data attestation, a validation metric set with adversarial-bypass rate, and a permitted-transports manifest. High-risk systems get the paperwork their risk class requires.
Runtime controls follow the ACO pattern with back-references to ISO 27002 and NIST SP 800-53 control IDs. Your ISMS Statement of Applicability maps one-to-one against WebWall rules.
DPV purposes and data categories on every classified payload. Verdicts explain exactly which consent scope a blocked action would have violated, in the vocabulary your DPO already uses.
Verdicts are W3C PROV-O activities with agent, entity, and fact references, signed with a post-quantum profile. Replayable against any later rule-set for regression analysis.
Model governance events, adversarial eval harness, and drift detection produce a continuous evidence trail against Govern, Map, Measure, and Manage functions.
LLM01 prompt injection, LLM06 sensitive-info disclosure, LLM08 excessive agency, LLM09 overreliance — each maps to a named WebWall rule and a named kyl threat DID.
Design-partner slots are open for Q3 2026. If your stack includes WebSocket or event-bus apps, embedded AI agents, or regulated data under strict audit — you are who we built this for.