Stop Attacks Before
They Reach Your App.
WAFio deploys three independent security layers — L7 Web Application Firewall, L3/L4 eBPF Network Firewall, and kernel-level Runtime Security — in a single on-premise agent. Block attacks at every layer of your stack. Fully self-hosted. Your data never leaves your infrastructure.
Complete security coverage,
kernel to application
WAFio deploys three independent security subsystems — each purpose-built for its layer of your stack. No single point of failure. No blind spots.
Web Application Firewall
Every inbound HTTP request is parsed by 8 AST-based semantic engines in parallel — SQL, XSS, command injection, LFI, SSRF, Java, PHP, and Python. OWASP CRS v4 adds signature coverage on top.
- 8 parallel AST-based semantic analyzers
- OWASP CRS v4 — 3,500+ detection rules
- Configurable sensitivity & score thresholds
- GeoIP country blocking + bot protection
- Sub-5ms p99 detection latency
eBPF Network Firewall
XDP and TC hooks run eBPF programs at the kernel driver level — packets are inspected and dropped before a single byte reaches userspace. Zero copy. Zero application overhead.
- XDP/TC hooks — kernel-native, pre-userspace
- IP, CIDR, and ASN block & allow lists
- Protocol and port-level enforcement
- Per-source rate limiting in BPF maps
- Real-time rule push from control plane via gRPC
Runtime Security
eBPF kprobes and tracepoints attach to the live kernel — no sampling, no polling. Detect code execution, privilege escalation, and data exfiltration that bypass the network layer entirely.
- Syscall monitoring via eBPF kprobes/tracepoints
- Process execution & binary integrity tracking
- File system event tracing (open, write, unlink)
- Outbound connection anomaly detection
- Container and host runtime visibility
Three layers of defense,
working as one.
eBPF drops malicious packets at the kernel before they reach userspace. The WAF inspects every HTTP request with semantic analysis. Runtime monitoring catches what bypasses the network entirely.
Packet Arrives at NIC
Every inbound packet triggers the XDP hook attached directly at the network driver level — before the kernel network stack allocates an sk_buff, before any socket is involved, and before any userspace process has a chance to see it. This is the earliest possible interception point in Linux.
BPF Map Rule Lookup
The XDP program performs a constant-time lookup against BPF hash maps holding block rules: individual IPs, CIDR ranges, Autonomous System Numbers (ASNs), and port/protocol combinations. Rules are pushed live from the WAFio control plane via gRPC — no agent restart, no rule reload delay.
Kernel Drop or Pass
Packets matching a block rule are returned XDP_DROP — discarded at the driver level in under 1 microsecond, never consuming kernel TCP stack resources or userspace CPU. Clean packets receive XDP_PASS and continue up the network stack as normal, with zero added latency.
TCP SYN 185.220.101.45:4422Packet discarded at NIC driverHTTP Request Intercepted
Packets that pass the eBPF firewall reach the WAFio WAF agent — a reverse proxy sidecar alongside your application. Every inbound HTTP request is intercepted before it reaches your app code. No code changes, no SDK, no library required. Works with any language or framework.
Semantic + CRS Analysis
8 AST-based semantic engines parse SQL, XSS, CMD injection, LFI, SSRF, Java deserialization, PHP, and Python payloads simultaneously. OWASP CRS v4 then adds 3,500+ signature rules on top — two independent detection layers running in parallel on every request.
Score & Decision Engine
The Decision Engine maps matched rules to threat categories, applies confidence weights, and sums scores. Requests above your configured block threshold are blocked instantly with HTTP 403. Below the threshold — logged with full context or allowed through silently.
GET /search?q=' OR 1=1--HTTP 403 — ForbiddenSyscall Invoked
Even if an attacker bypasses the network — Runtime Security watches inside the host. Every call to execve, openat, connect, bind, and 40+ other syscalls triggers an eBPF kprobe or tracepoint on the live kernel. No kernel module, no sampling, no polling.
Event Enriched & Analyzed
Each kprobe capture includes: PID, parent process tree, full binary path and SHA-256 hash, effective user and group IDs, cgroup, and Linux namespace identifiers. Events are evaluated against process baseline profiles and behavioral rules — detecting anomalies like a web server spawning a shell.
Alert or Enforce
Anomalous events stream in real-time to the WAFio dashboard with full forensic context: process tree, binary fingerprint, syscall arguments, and container attribution. Optionally enforce via seccomp-style response — the syscall is blocked before it completes, stopping the threat at the kernel boundary.
execve("/bin/bash", ["-i"])Event streamed to dashboardBeyond the WAF: eBPF-powered defense
While competitors stop at L7, WAFio reaches into the kernel. Two independent eBPF subsystems watch what the network layer can't see.
eBPF Network Firewall
XDP programs attach to the NIC driver — packets are inspected and dropped before the kernel network stack processes them. Sub-microsecond per-packet overhead.
Runtime Security
eBPF kprobes and tracepoints hook directly into live kernel functions — monitoring process execution, file access, and syscalls in real-time with zero sampling overhead.
Your data. Your infrastructure.
Your control.
Unlike SaaS WAFs that route your traffic through their cloud, WAFio runs entirely within your network. Your request payloads, application data, and security logs never leave your servers. Full compliance. Zero trust issues.
Start with
Free Forever
WAFio is free for small infrastructure: 1 control plane, 1 WAF agent, and 1 host agent per license. Built for SMEs, schools, individuals, and software engineers who need self-hosted protection without enterprise pricing.
Free Forever
For small infrastructure that needs real protection without procurement friction.
- 1 control plane license
- 1 WAF agent
- 1 host agent
- Core WAF features
- Dashboard & analytics
- Self-hosted by default
Transparent licensing, no hidden fees, and no cloud lock-in. Need a larger deployment? Contact us.
Deploy WAFio in
under 5 minutes.
Download the binary, configure your license, point your traffic through WAFio.
Your applications are protected before your next coffee.
# Quick install$ curl -sSL https://get.wafio.cloud/install.sh | bash