Raidu sits in the path between your agents and the things they reach for. That includes every major LLM, every major SaaS tool, and every major identity provider. Drop-in today. Swap providers tomorrow. Audit log keeps going.
6 integrations · live demos
Anthropic's coding agent in your terminal.
Govern every Claude Code session. Raidu intercepts shell-exec and file-edit tool calls, redacts secrets before they leave the terminal, and …
Autonomous coding agent for VS Code.
Govern every Cline agent action in VS Code. Raidu redacts code context, gates shell and file operations, and signs every step. SOC 2, HIPAA, …
Open-source AI code assistant for VS Code and JetBrains.
Govern Continue across every VS Code and JetBrains developer. Raidu centralizes policy for the open-source AI coding assistant, redacts …
AI-first code editor, built on VS Code.
Govern every Cursor prompt. Raidu masks secrets and proprietary code, enforces model and repo policy, and signs every completion. No plugin. …
AI pair programmer across IDEs, CLI, and the web.
Add the evidence layer GitHub Copilot does not ship with. Raidu centralizes policy across Copilot and every other AI coding tool your team …
Codeium's agentic IDE with the Cascade agent.
Govern every Windsurf Cascade action. Raidu masks code context, authorizes tool calls, scans output, and signs evidence. Enterprise SOC 2, …
Every connector ships with a manifest declaring the PII it needs. The firewall adapts per connector. Policies inherit from the manifest; violations produce signed denials, not silent drops.
Four ways to add Raidu to a codebase. Pick the one that matches your stack, the signed record is the same whichever you choose.
from raidu import Raidu
raidu = Raidu(tenant="acme-corp")
# Wrap your existing LLM client. That's it.
client = raidu.wrap(
provider="anthropic",
model="claude-sonnet-4.5",
policy="enterprise.v17"
)
result = client.messages.create(
messages=[{"role":"user","content":user_input}],
tools=[gmail_send, salesforce_update]
)
# result.record is the signed execution record
print(result.record.decision) # "allow"
print(result.record.signature_valid) # True