Your API Gateway, Now Quantum-Safe
Drop-in replacement for Kong and Apigee with native post-quantum TLS, AI-powered threat detection, and configurable security policies. Built in Rust for maximum performance.
Quantum-Safe Security, Zero Compromise
Enterprise API gateway features with post-quantum TLS built into the core
Post-Quantum TLS
FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA) with hybrid X25519 + ML-KEM-768. Four configurable TLS policies to match your migration timeline.
Blazing Fast Rust Engine
Axum + Tokio-powered data plane. Async I/O, zero-copy forwarding, 10,000+ concurrent connections with sub-millisecond per-request overhead.
AI-Powered Threat Detection
Real-time anomaly detection catches quantum downgrade attacks, bot traffic, weak ciphers, replay attacks, and anomalous patterns automatically.
4 TLS Migration Policies
Go quantum-safe at your own pace. From CLASSICAL_ALLOWED for legacy support to PQC_ONLY for maximum security.
Drop-in Replacement
Replace Kong, Apigee, or Nginx without rewriting your stack. Same routing, same patterns โ with quantum-safe security added.
Zero-Trust Architecture
JWT + API key auth, per-IP rate limiting, HSTS, CSP, CORS, role-based access control. Defense in depth at every layer.
AI-Powered Threat Detection
Six threat categories detected and classified in real time
QUANTUM_DOWNGRADE
Attempts to force classical cipher suites
WEAK_CIPHER
Deprecated cipher suites (RC4, DES, 3DES)
BOT_ATTACK
Automated traffic and endpoint probing
REPLAY_ATTACK
Replayed TLS sessions detected
ANOMALOUS_TRAFFIC
Unusual patterns and rate spikes
CERTIFICATE_ISSUE
Invalid or expired certificates
Battle-Tested Architecture
Rust data plane, Go control plane, Python AI engine โ each component optimized for its role
Rust Gateway
Axum + Tokio data plane with PQC TLS termination, reverse proxy, and zero-copy forwarding
Go Control Plane
Configuration management, health checks, route management, and admin API on port 8085
Python AI Engine
Real-time threat classification, anomaly detection, and security analytics on port 8086
Deploy in Under 60 Seconds
One command to deploy the full stack โ gateway, control plane, AI engine, and admin UI
QSGW vs. Traditional Gateways
The only API gateway with post-quantum TLS and AI threat detection built into the core
| Feature | QSGW | Kong | Apigee | Envoy | Nginx |
|---|---|---|---|---|---|
| Post-Quantum TLS | โ | โ | โ | โ | โ |
| Hybrid PQC + Classical | โ | โ | โ | โ | โ |
| Quantum Downgrade Detection | โ | โ | โ | โ | โ |
| AI Threat Detection | โ | โ ๏ธ plugin | โ ๏ธ plugin | โ | โ |
| TLS Migration Policies | โ | โ | โ | โ | โ |
| Reverse Proxy | โ | โ | โ | โ | โ |
| Rate Limiting | โ | โ | โ | โ | โ |
| JWT Auth | โ | โ | โ | โ | โ ๏ธ plugin |
| Admin Dashboard | โ | โ | โ | โ | โ |
| Built in Rust | โ | โ Lua/Go | โ Java | โ C++ | โ C |
| Open Source | โ | โ ๏ธ partial | โ | โ | โ |
Documentation
Everything you need to deploy, configure, and contribute
Architecture
System design, data flow, and tech decisions
API Reference
Complete REST API with examples
Gateway Configuration
TLS policies, routing, and proxy settings
Deployment Guide
Docker, Kubernetes, and production ops
Development Guide
Local setup, coding standards, debugging
Threat Detection
AI engine configuration and threat categories
Contributing
How to contribute to QSGW
Security Policy
Vulnerability reporting and security info
Built in the Open
QSGW is open source under Apache 2.0. Whether you're a Rust developer, DevOps engineer, or security professional โ there's a place for you here.
Fork & Clone
Fork the repo and set up your local environment
Make Changes
Pick an issue, create a branch, and write your code
Submit PR
Run tests, push, and open a pull request