Enterprise-Grade Open Source

Your API Gateway, Now Quantum-Safe

Drop-in replacement for Kong and Apigee with native post-quantum TLS, AI-powered threat detection, and configurable security policies. Built in Rust for maximum performance.

Rust 1.75+ Go 1.23 Python 3.11+ React 19 NIST FIPS Apache 2.0
terminal
live
$ git clone https://github.com/yazhsab/qbitel-qsgw.git && cd qbitel-qsgw
$ make docker-all
$ curl http://localhost:8085/health
{"status":"ok"}

Quantum-Safe Security, Zero Compromise

Enterprise API gateway features with post-quantum TLS built into the core

๐Ÿ”’

Post-Quantum TLS

FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA) with hybrid X25519 + ML-KEM-768. Four configurable TLS policies to match your migration timeline.

๐Ÿš€

Blazing Fast Rust Engine

Axum + Tokio-powered data plane. Async I/O, zero-copy forwarding, 10,000+ concurrent connections with sub-millisecond per-request overhead.

๐Ÿค–

AI-Powered Threat Detection

Real-time anomaly detection catches quantum downgrade attacks, bot traffic, weak ciphers, replay attacks, and anomalous patterns automatically.

๐ŸŽ›๏ธ

4 TLS Migration Policies

Go quantum-safe at your own pace. From CLASSICAL_ALLOWED for legacy support to PQC_ONLY for maximum security.

๐Ÿ”„

Drop-in Replacement

Replace Kong, Apigee, or Nginx without rewriting your stack. Same routing, same patterns โ€” with quantum-safe security added.

๐Ÿ›ก๏ธ

Zero-Trust Architecture

JWT + API key auth, per-IP rate limiting, HSTS, CSP, CORS, role-based access control. Defense in depth at every layer.

AI-Powered Threat Detection

Six threat categories detected and classified in real time

๐Ÿ”ด CRITICAL

QUANTUM_DOWNGRADE

Attempts to force classical cipher suites

๐ŸŸ  HIGH

WEAK_CIPHER

Deprecated cipher suites (RC4, DES, 3DES)

๐ŸŸ  HIGH

BOT_ATTACK

Automated traffic and endpoint probing

๐ŸŸ  HIGH

REPLAY_ATTACK

Replayed TLS sessions detected

๐ŸŸก MEDIUM

ANOMALOUS_TRAFFIC

Unusual patterns and rate spikes

๐ŸŸก MEDIUM

CERTIFICATE_ISSUE

Invalid or expired certificates

Battle-Tested Architecture

Rust data plane, Go control plane, Python AI engine โ€” each component optimized for its role

Clients
Web / Mobile / API Consumers
PQC TLS 1.3
QSGW Gateway
Rust ยท Axum/Tokio ยท PQC TLS ยท Auth ยท Rate Limit ยท Reverse Proxy
:8443
REST / gRPC
Control Plane
Go ยท Config ยท Routes
:8085
AI Engine
Python ยท Anomaly ยท Bot
:8086
Upstream Services
Your APIs
SQL / Raft
PostgreSQL
Routes ยท Threats ยท TLS
:5432
etcd
Distributed Config
:2379
Admin Dashboard
React 19
:3004
๐Ÿฆ€

Rust Gateway

Axum + Tokio data plane with PQC TLS termination, reverse proxy, and zero-copy forwarding

โšก

Go Control Plane

Configuration management, health checks, route management, and admin API on port 8085

๐Ÿค–

Python AI Engine

Real-time threat classification, anomaly detection, and security analytics on port 8086

Deploy in Under 60 Seconds

One command to deploy the full stack โ€” gateway, control plane, AI engine, and admin UI

Docker Quick Start
# Clone and start the full stack
$ git clone https://github.com/yazhsab/qbitel-qsgw.git && cd qbitel-qsgw
$ make docker-all
# Verify
$ curl http://localhost:8085/health
{"status":"ok","service":"qsgw-control-plane"}
:8443
Gateway
Rust + PQC TLS
:8085
Control Plane
Go Admin API
:8086
AI Engine
Python + FastAPI
:3003
Admin UI
React 19

QSGW vs. Traditional Gateways

The only API gateway with post-quantum TLS and AI threat detection built into the core

Feature QSGW Kong Apigee Envoy Nginx
Post-Quantum TLS โœ… โŒ โŒ โŒ โŒ
Hybrid PQC + Classical โœ… โŒ โŒ โŒ โŒ
Quantum Downgrade Detection โœ… โŒ โŒ โŒ โŒ
AI Threat Detection โœ… โš ๏ธ plugin โš ๏ธ plugin โŒ โŒ
TLS Migration Policies โœ… โŒ โŒ โŒ โŒ
Reverse Proxy โœ… โœ… โœ… โœ… โœ…
Rate Limiting โœ… โœ… โœ… โœ… โœ…
JWT Auth โœ… โœ… โœ… โœ… โš ๏ธ plugin
Admin Dashboard โœ… โœ… โœ… โŒ โŒ
Built in Rust โœ… โŒ Lua/Go โŒ Java โŒ C++ โŒ C
Open Source โœ… โš ๏ธ partial โŒ โœ… โœ…

Built in the Open

QSGW is open source under Apache 2.0. Whether you're a Rust developer, DevOps engineer, or security professional โ€” there's a place for you here.

1

Fork & Clone

Fork the repo and set up your local environment

2

Make Changes

Pick an issue, create a branch, and write your code

3

Submit PR

Run tests, push, and open a pull request