Documentation

Everything you need to protect your stack and secure your APIs in under 5 minutes.

Quick Start

Python Setup

Step 1: Install the SDK

pip install desicon-seal

Step 2: Initialize Seal

from seal_ai import seal

seal.init(
    api_key="seal_live_xxxx",   # From your dashboard
    app_name="My App",
    environment="production",  # "production" | "staging" | "development"
    rescue_engine=True,        # Automatically apply AI hotfixes
    level="error"              # "fatal" | "error" | "warning"
)

Node.js Setup

Step 1: Install the SDK

npm install desicon-seal

Step 2: Initialize Seal

const { seal } = require('desicon-seal');

seal.init({
    apiKey: "seal_live_xxxx",   // From your dashboard
    appName: "My App",
    environment: "production", // "production" | "staging" | "development"
    rescueEngine: true,        // Automatically apply AI hotfixes
    level: "error"             // "fatal" | "error" | "warning"
});

Browser CDN Setup

Step 1: Install the SDK

<!-- Drop this in your <head> -->
<script src="https://cdn.jsdelivr.net/gh/Desicon-AI/seal-cdn@main/seal.js"></script>

Step 2: Initialize Seal

<script>
  Seal.init({
    apiKey: "seal_live_xxxx",   // From your dashboard
    appName: "My Frontend App",
    environment: "production", // "production" | "staging" | "development"
    rescueEngine: true,        // Automatically apply AI hotfixes
    level: "error"             // "fatal" | "error" | "warning"
  });
</script>

Step 3: Trigger an Error

Throw an exception. Seal will securely intercept the stack trace, perform an intelligent root-cause analysis, and dispatch a comprehensive incident report to your team's Slack or Microsoft Teams channel.

Configuration

Python ParameterNode.js / Browser ParameterTypeDescription
api_keyapiKeystringYour project API key from the dashboard.
app_nameappNamestringA human-readable name for your application.
environmentenvironmentstringCurrent deployment environment: 'production', 'staging', or 'development'.
rescue_enginerescueEnginebooleanSet to true to enable automated AI hotfix generation and patching.
levellevelstringfatal | error | warning

The Sensitivity Dialer

The Sensitivity Dialer controls how much noise Seal generates. Set it in two places:

  • SDK: Set level in seal.init().
  • Dashboard: Override per-project in Settings. Server enforces it.

Low

fatal

Only unhandled crashes.

seal.init({ level: "fatal" });

Medium

error

Caught exceptions + fatal.

seal.init({ level: "error" });

High

warning

Everything. Good luck.

seal.init({ level: "warning" });

Seal Rescue Engine

A Premium feature that allows Seal to dynamically patch bugs in real-time using encrypted, location-aware fixes.

When the Rescue Engine is enabled (via Project Settings), Seal doesn't just send you an alert. It instructs your connected AI to generate a functional, sandboxed JavaScript fix that addresses the logical error. The fix is minified and encrypted before leaving the server—only your SDK (holding the same API key) can decrypt and execute it.

Each fix is uniquely identified (seal_fix_xxxx) and location-aware: the same error type at two different code locations gets two separate fixes. If a fix fails to apply, the SDK automatically reports the failure, the bad fix is scrubbed server-side, and a fresh fix is generated on the next occurrence. No stale fixes, no fix-the-fix loops.

How to use it

  • 1. Enable 'Seal Rescue Engine' in your Project settings.
  • 2. Ensure you have an AI Provider configured in settings.
  • 3. When an unhandled error occurs, Seal generates an encrypted rescue fix.
  • 4. The SDK decrypts and applies this fix in memory—invisible to network inspectors, DevTools, and MITM proxies.

Stack Compatibility & Frameworks

The Rescue Engine dynamically patches JavaScript bugs in the browser, but it is fully compatible with ANY backend stack.

Server-Rendered Apps

Even if your backend is Python or PHP, your users still interact with HTML/JS in the browser. Drop the Seal JS SDK into your Jinja2, Django, or Blade templates. The Rescue Engine will catch and hotfix frontend JavaScript bugs seamlessly.

base.html (Jinja2 / Django / Blade)
<!DOCTYPE html>
<html>
<head>
    <!-- Drop Seal before your other scripts -->
    <script src="https://cdn.jsdelivr.net/gh/Desicon-AI/seal-cdn@main/seal.js"></script>
    <script>
      Seal.init({
        apiKey: "{{ SEAL_API_KEY }}", // Passed from backend
        appName: "My Web App",
        rescueEngine: true
      });
    </script>
</head>
<body>
    {% block content %}{% endblock %}
</body>
</html>

Seal Security Engine (WAF)

A lightweight, zero-polling Web Application Firewall built directly into the Seal SDKs.

Seal isn't just for unhandled exceptions. By attaching the optional Seal Middleware to your application, you can instantly protect your server against Brute Force attacks, SQL Injections, Cross-Site Scripting (XSS), and malicious Honeypot scans.

Because Seal follows a 'Wake up on errors' philosophy, this adds near-zero overhead to your application. It intercepts threats instantly and dispatches a dedicated Security Webhook to your Slack or Discord, complete with the attacker's IP and request context.

WAF Payload Inspection

Lightning-fast regex scans on the Request URL and Body to block SQLi, XSS, and Path Traversal.

Brute Force Tracker (401/403)

In-memory sliding window that flags any IP address failing authentication 10 times within 60 seconds.

Honeypot Traps

Automatic interception of common bot-scanning paths (e.g., /wp-admin, /.env). Any hit instantly triggers an alert.

How to enable

Express/Connect (Node.js)

const express = require('express');
const { seal } = require('desicon-seal');

const app = express();

// 1. Initialize Seal first
seal.init({
    apiKey: "seal_live_xxxx",
    appName: "My Web App",
    environment: "production"
});

// 2. Attach the Security Middleware before your routes
app.use(seal.httpMiddleware());

app.get('/', (req, res) => res.send('Protected!'));

FastAPI/Starlette (Python)

from fastapi import FastAPI
from seal_ai.client import seal

app = FastAPI()

# 1. Initialize Seal first
seal.init(
    api_key="seal_live_xxxx",
    app_name="My Web App",
    environment="production"
)

# 2. Attach the Security Middleware before your routes
app.add_middleware(seal.asgi_middleware())

@app.get("/")
def read_root():
    return {"status": "Protected!"}

Integrations

Bring Your Own AI (BYOAI)

Seal works out of the box with advanced static analysis. For intelligent code-level remediation and dynamic root-cause explanations, you can securely integrate your preferred AI provider (OpenAI, Anthropic, Groq, Ollama). We never markup token usage. If your API goes down, Seal seamlessly falls back to standard mode.

Dashboard Navigation
Dashboard → Settings → Select Provider → Paste Key

Slack Webhooks

Seal sends rich, formatted alerts directly to your Slack channels with full stack traces, AI analysis, and severity badges.

Dashboard Navigation
1. Dashboard → Settings → Connect Slack
2. Slack → Channel → Settings → Integrations → Add Seal

Microsoft Teams

Same rich alerts, delivered straight to your Microsoft Teams channels. Perfect for enterprise response teams.

Dashboard Navigation
Dashboard → Settings → Connect Teams

Sandbox Testing

Use your Sandbox project to test Seal's ingestion and AI analysis without triggering webhooks or skewing your live analytics. Sandbox API keys always start with sandbox_ and can be found in your Dashboard. You can also test everything interactively in the Playground.

Python Sandbox Setup

from seal_ai import seal

seal.init(
    api_key="sandbox_YOUR_KEY",
    app_name="Test App",
    environment="development",
    endpoint="https://sealengine.desicon.ai/api/v1/sandbox/ingest"
)

Node.js Sandbox Setup

const { seal } = require('desicon-seal');

seal.init({
    apiKey: "sandbox_YOUR_KEY",
    appName: "Test App",
    environment: "development",
    endpoint: "https://sealengine.desicon.ai/api/v1/sandbox/ingest"
});

Browser CDN Sandbox Setup

<script>
  Seal.init({
    apiKey: "sandbox_YOUR_KEY",
    appName: "Test App",
    environment: "development",
    endpoint: "https://sealengine.desicon.ai/api/v1/sandbox/ingest"
  });
</script>