SphinxGate
SphinxGate applies policy guardrails to your model routing. As agent systems grow — multiple models, fallback chains, different providers for different tasks — routing becomes a reliability surface in its own right. SphinxGate makes it controllable, inspectable, and provable.The Problem SphinxGate Solves
Multi-model agent systems have a routing problem that almost no one addresses until something goes wrong:- Which models are actually being called? Not which ones you think — which ones are actually used in production.
- Why did the fallback fire? Was it expected or a silent failure?
- Who approved this routing change? Can you prove compliance?
- Can you trust the audit trail? If your routing logs are incomplete, you can’t answer incidents or audits.
What SphinxGate Does
Policy Enforcement
Allow/deny rules for which models and providers can be used — and under what conditions.
Routing Audit Trail
Every routing decision logged with the model chosen, the reason, and the policy applied.
Fail Behavior Control
Configure fail-open vs. hard-fail behavior per route. No silent surprises.
Anomaly Detection
Flags unexpected routing patterns — unauthorized models, unusual fallback frequency, policy violations.
How Routing Policy Works
SphinxGate operates as a policy layer between your agent and the model router:Policy Model
SphinxGate policies are simple allow/deny rules with conditions:Fail Behaviors
| Behavior | Meaning | When to Use |
|---|---|---|
hard_fail | Request fails with error | Compliance, security-sensitive routes |
fail_open | Falls through to next policy/fallback | Resilience-first configurations |
log_deny | Deny logged, request proceeds | Audit-without-blocking mode |
log_alert | Permitted but flagged | Monitor unexpected-but-acceptable routes |
Routing Log Format
Every decision is logged:Anomaly Detection
SphinxGate flags routing patterns that don’t match expectations:| Anomaly | Trigger |
|---|---|
| Unauthorized model | A model outside the allow list was requested |
| Fallback frequency spike | Fallbacks firing much more than baseline |
| Policy violation attempt | Explicit deny rule triggered |
| Unknown provider | Request routed to unrecognized provider endpoint |
| Config bypass attempt | Routing attempted outside SphinxGate |
Quick Start
CLI Reference
SphinxGate vs Agent-Level Config
You might already configure model fallbacks in your agent’s gateway config. SphinxGate is not a replacement for that — it’s a policy and audit layer on top of it.| Layer | What It Does |
|---|---|
| Gateway config | Defines fallback chains and preferred models |
| SphinxGate | Enforces policy on top of those choices; logs every decision |
Who SphinxGate Is For
SphinxGate is most valuable for teams that:- Use multiple models or providers and need to know which ones fire
- Have compliance requirements around AI model usage
- Run production-grade agent systems where unauthorized routing is a risk
- Want audit-ready logging without building it themselves