Multi-file edits with no pre-review
Cascade stages changes across many files before the developer sees the diff. Without a response-scan layer, insecure or license-flagged code can land in the editor in bulk.
Windsurf's Cascade agent plans, edits, and executes across your codebase. Raidu sits between Cascade and the model, redacts outbound context, gates every tool call, scans responses, and signs the evidence.
Windsurf is a full IDE, not an extension. Cascade reads your repo, writes code across files, and executes commands. That is the value. That is the governance surface.
Cascade is not a suggestion engine. It is an agent. Four failure modes security teams see when Cascade ships without a governance layer.
Cascade stages changes across many files before the developer sees the diff. Without a response-scan layer, insecure or license-flagged code can land in the editor in bulk.
Cascade runs scripts, tests, and installs. A misfired command touches infrastructure. Without per-tool policy, the first signal is an incident.
To plan across files, Cascade reads widely. Without redaction, secrets and business logic leak to whichever provider the team configured. Nothing on your side proves what did or did not leave.
Windsurf's internal logs are not signed, not chained, and not designed for SOC 2 or HIPAA evidence packages. Regulators ask for one exportable bundle, not a screenshot of a panel.
Windsurf supports custom model endpoints. Point Cascade at Raidu and every plan, tool call, and response flows through the same runtime that governs the rest of your AI stack.
Every file Cascade opens, every shell output, every instruction is scanned before it leaves for the provider. Secrets, PII, and flagged internals are deterministically tokenized. The agent still reasons with the data. The data does not leave raw.
Allowlist shell commands, path-glob file writes, require approval for destructive operations. Policy is shared with your other coding tools, so Cascade and Cursor follow the same rules.
Model output is checked for unsafe code, license risks, hallucinated packages, and exfiltration patterns before the editor renders the diff. Clean output streams through. Blocked output is logged with a reason.
Every Cascade turn is a signed record linked to the previous one. Prompts, tools, diffs, responses, policy version, user identity. RSA-4096 signed, SHA-256 chained, WORM retained. Exportable for SOC 2.
Windsurf supports OpenAI-compatible endpoints for custom models. Point the endpoint and key at Raidu and Cascade is governed from that moment.
{
"cascade.modelProvider": "openai",
"cascade.openaiBaseUrl": "https://proxy.raidu.com/acme-corp/openai",
"cascade.openaiApiKey": "raidu_xxx",
"cascade.model": "claude-sonnet-4.5",
"cascade.customHeaders": {
"x-raidu-policy": "coding.eng.v7"
}
}
// Every Cascade turn returns x-raidu-record-id in the response headers.