Documentation
Everything you need to protect your stack and secure your APIs in under 5 minutes.
Quick Start
Python Setup
Step 1: Install the SDK
pip install desicon-sealStep 2: Initialize Seal
from seal_ai import seal
seal.init(
api_key="seal_live_xxxx", # From your dashboard
app_name="My App",
environment="production", # "production" | "staging" | "development"
rescue_engine=True, # Automatically apply AI hotfixes
level="error" # "fatal" | "error" | "warning"
)Node.js Setup
Step 1: Install the SDK
npm install desicon-sealStep 2: Initialize Seal
const { seal } = require('desicon-seal');
seal.init({
apiKey: "seal_live_xxxx", // From your dashboard
appName: "My App",
environment: "production", // "production" | "staging" | "development"
rescueEngine: true, // Automatically apply AI hotfixes
level: "error" // "fatal" | "error" | "warning"
});Browser CDN Setup
Step 1: Install the SDK
<!-- Drop this in your <head> -->
<script src="https://cdn.jsdelivr.net/gh/Desicon-AI/seal-cdn@main/seal.js"></script>Step 2: Initialize Seal
<script>
Seal.init({
apiKey: "seal_live_xxxx", // From your dashboard
appName: "My Frontend App",
environment: "production", // "production" | "staging" | "development"
rescueEngine: true, // Automatically apply AI hotfixes
level: "error" // "fatal" | "error" | "warning"
});
</script>Step 3: Trigger an Error
Throw an exception. Seal will securely intercept the stack trace, perform an intelligent root-cause analysis, and dispatch a comprehensive incident report to your team's Slack or Microsoft Teams channel.
Configuration
| Python Parameter | Node.js / Browser Parameter | Type | Description |
|---|---|---|---|
| api_key | apiKey | string | Your project API key from the dashboard. |
| app_name | appName | string | A human-readable name for your application. |
| environment | environment | string | Current deployment environment: 'production', 'staging', or 'development'. |
| rescue_engine | rescueEngine | boolean | Set to true to enable automated AI hotfix generation and patching. |
| level | level | string | fatal | error | warning |
The Sensitivity Dialer
The Sensitivity Dialer controls how much noise Seal generates. Set it in two places:
- SDK: Set level in seal.init().
- Dashboard: Override per-project in Settings. Server enforces it.
Low
Only unhandled crashes.
seal.init({ level: "fatal" });Medium
Caught exceptions + fatal.
seal.init({ level: "error" });High
Everything. Good luck.
seal.init({ level: "warning" });Seal Rescue Engine
A Premium feature that allows Seal to dynamically patch bugs in real-time using encrypted, location-aware fixes.
When the Rescue Engine is enabled (via Project Settings), Seal doesn't just send you an alert. It instructs your connected AI to generate a functional, sandboxed JavaScript fix that addresses the logical error. The fix is minified and encrypted before leaving the server—only your SDK (holding the same API key) can decrypt and execute it.
Each fix is uniquely identified (seal_fix_xxxx) and location-aware: the same error type at two different code locations gets two separate fixes. If a fix fails to apply, the SDK automatically reports the failure, the bad fix is scrubbed server-side, and a fresh fix is generated on the next occurrence. No stale fixes, no fix-the-fix loops.
How to use it
- • 1. Enable 'Seal Rescue Engine' in your Project settings.
- • 2. Ensure you have an AI Provider configured in settings.
- • 3. When an unhandled error occurs, Seal generates an encrypted rescue fix.
- • 4. The SDK decrypts and applies this fix in memory—invisible to network inspectors, DevTools, and MITM proxies.
Stack Compatibility & Frameworks
The Rescue Engine dynamically patches JavaScript bugs in the browser, but it is fully compatible with ANY backend stack.
Server-Rendered Apps
Even if your backend is Python or PHP, your users still interact with HTML/JS in the browser. Drop the Seal JS SDK into your Jinja2, Django, or Blade templates. The Rescue Engine will catch and hotfix frontend JavaScript bugs seamlessly.
<!DOCTYPE html>
<html>
<head>
<!-- Drop Seal before your other scripts -->
<script src="https://cdn.jsdelivr.net/gh/Desicon-AI/seal-cdn@main/seal.js"></script>
<script>
Seal.init({
apiKey: "{{ SEAL_API_KEY }}", // Passed from backend
appName: "My Web App",
rescueEngine: true
});
</script>
</head>
<body>
{% block content %}{% endblock %}
</body>
</html>Seal Security Engine (WAF)
A lightweight, zero-polling Web Application Firewall built directly into the Seal SDKs.
Seal isn't just for unhandled exceptions. By attaching the optional Seal Middleware to your application, you can instantly protect your server against Brute Force attacks, SQL Injections, Cross-Site Scripting (XSS), and malicious Honeypot scans.
Because Seal follows a 'Wake up on errors' philosophy, this adds near-zero overhead to your application. It intercepts threats instantly and dispatches a dedicated Security Webhook to your Slack or Discord, complete with the attacker's IP and request context.
WAF Payload Inspection
Lightning-fast regex scans on the Request URL and Body to block SQLi, XSS, and Path Traversal.
Brute Force Tracker (401/403)
In-memory sliding window that flags any IP address failing authentication 10 times within 60 seconds.
Honeypot Traps
Automatic interception of common bot-scanning paths (e.g., /wp-admin, /.env). Any hit instantly triggers an alert.
How to enable
Express/Connect (Node.js)
const express = require('express');
const { seal } = require('desicon-seal');
const app = express();
// 1. Initialize Seal first
seal.init({
apiKey: "seal_live_xxxx",
appName: "My Web App",
environment: "production"
});
// 2. Attach the Security Middleware before your routes
app.use(seal.httpMiddleware());
app.get('/', (req, res) => res.send('Protected!'));FastAPI/Starlette (Python)
from fastapi import FastAPI
from seal_ai.client import seal
app = FastAPI()
# 1. Initialize Seal first
seal.init(
api_key="seal_live_xxxx",
app_name="My Web App",
environment="production"
)
# 2. Attach the Security Middleware before your routes
app.add_middleware(seal.asgi_middleware())
@app.get("/")
def read_root():
return {"status": "Protected!"}Integrations
Bring Your Own AI (BYOAI)
Seal works out of the box with advanced static analysis. For intelligent code-level remediation and dynamic root-cause explanations, you can securely integrate your preferred AI provider (OpenAI, Anthropic, Groq, Ollama). We never markup token usage. If your API goes down, Seal seamlessly falls back to standard mode.
Slack Webhooks
Seal sends rich, formatted alerts directly to your Slack channels with full stack traces, AI analysis, and severity badges.
Microsoft Teams
Same rich alerts, delivered straight to your Microsoft Teams channels. Perfect for enterprise response teams.
Sandbox Testing
Use your Sandbox project to test Seal's ingestion and AI analysis without triggering webhooks or skewing your live analytics. Sandbox API keys always start with sandbox_ and can be found in your Dashboard. You can also test everything interactively in the Playground.
Python Sandbox Setup
from seal_ai import seal
seal.init(
api_key="sandbox_YOUR_KEY",
app_name="Test App",
environment="development",
endpoint="https://sealengine.desicon.ai/api/v1/sandbox/ingest"
)Node.js Sandbox Setup
const { seal } = require('desicon-seal');
seal.init({
apiKey: "sandbox_YOUR_KEY",
appName: "Test App",
environment: "development",
endpoint: "https://sealengine.desicon.ai/api/v1/sandbox/ingest"
});Browser CDN Sandbox Setup
<script>
Seal.init({
apiKey: "sandbox_YOUR_KEY",
appName: "Test App",
environment: "development",
endpoint: "https://sealengine.desicon.ai/api/v1/sandbox/ingest"
});
</script>