WiseChef (internal + public service)
Agent Rescue — diagnostic service for broken AI agents
Built a roadside-assistance service for broken AI agents. Free scanner, $7 to unlock fixes. 26 passing adversarial tests on the security-critical egress firewall before public launch.
The situation
Most AI agents in production fail silently. They stop responding, drift off-task, get stuck on retries, or burn money calling the wrong endpoints — and the owner finds out hours later when a customer complains. We wanted a tool that could look at a running agent from the outside and tell its owner what was actually broken, without requiring deep-root access.
What we did
- Built a standalone diagnostic service that provisions an ephemeral Cloudflare tunnel to the target agent, runs a scan, and reports back
- Free tier: scan-only. Paid tier ($7): unlock the fix workflow and apply it under supervision
- Hardened the core egress firewall for the scanning side — fail-closed DNS, IPv4-mapped IPv6 handling, port stripping, alternate IPv4 notations, CIDR coverage for multicast, reserved, CGNAT, 6to4, and NAT64 ranges
- Wrote a 26-test adversarial suite for the egress layer. All 26 pass
- Shipped behind two layers of auth: per-session SSH key fallback plus a bearer-token gate on the management surface
- Security review occurred before the public release; the hardening PR merged to
mainwith the full test suite attached
Timeline: 4 days from scope to public release, including adversarial review.
What changed
The service is live at rescue.wisechef.ai — visit it now and run a free Scan in under 2 minutes. Anyone with a broken agent can run a Scan for free. Paid tier unlocks the automated fix workflow ($7 Scan, $29 Rescue, $79/mo continuous Ward).
Live as of 2026-04-28: brand-parity panel with React-Vite SPA, isolated Hetzner CX23 VPS in Falkenstein, GDPR Article 28-compliant DPA + privacy notice, 575+ tests across backend/frontend/security/e2e, network ACLs that hard-block outbound from the rescue VPS to our internal infrastructure (verified: a compromised rescue agent CANNOT pivot to our other systems).
For buyers: this is the kind of work we do on our own infrastructure before shipping it to clients. The hardening is real engineering, not a security badge on a marketing page. We do the adversarial review ourselves, in writing, and ship the patch before the button goes live.
Want to try it? Free Scan →
Relevant context
The egress-firewall work was not easy. Six classes of DNS and IP-notation edge cases were caught only by writing an adversarial review explicitly looking for fail-open paths. The fact that an agent-diagnostics tool needs a fail-closed DNS resolver is itself a lesson about how fragile most agent deployments are — the failure modes are not where you would look first.
The core code lives in a private repo for now. We plan to extract and open-source the egress-hardening module as a standalone package; it is useful beyond this one service.