Guides

Best AI Gateway for Cursor Composer Multi-File Edits in 2026

Six AI gateways for Cursor Composer multi-file edits in 2026, scored on semantic caching, per-developer budgets, and secret scanning at the edit boundary.

·
Updated
·
17 min read
ai-gateway cursor cursor-composer developer-platform ai-governance 2026
Editorial cover image for Best AI Gateway for Cursor Composer Multi-File Edits in 2026
Table of Contents

A single Cursor Composer action pulls 10 to 30 files into context, ships 50K to 200K input tokens, and fans out N parallel file-edit operations. A 40-engineer team running 30 Compose actions a day produces about 36,000 multi-file edits a month, each a small distributed system with its own file-set context, partial-failure modes, and retry semantics. Cursor’s admin console shows total tokens per user. It doesn’t show what one action cost, which files it touched, why turn 3 of 5 failed, whether a secret slipped in, or whether the same diff would have cost a third on claude-sonnet-4-6 instead of claude-opus-4-7.

That’s the operating reality of Composer at scale in 2026 without a gateway in front of it. Composer is excellent; deployed bare across a 200-engineer org, it’s also a compliance gap and a budget bleed. The gateway in front of Composer has to do three things the IDE can’t: semantic caching of the file-set context, per-developer budgets the platform enforces, and secret scanning at the edit boundary before code leaves your perimeter. Without those three, multi-file workflows are a token bonfire wearing a productivity label.

This is the 2026 cohort, scored on the seven Composer-specific axes.

TL;DR

Future AGI Agent Command Center is the strongest pick for an AI gateway in front of Cursor Composer multi-file edits because it ties N file-edit spans to one parent Compose action, runs semantic caching on the file-set context, scans inbound prompts for secrets and prompt injection before the request ships, enforces per-developer budgets at five levels, and handles sub-edit retry without double-billing the input context. The other five picks win on specific edges.

  1. Future AGI Agent Command Center — best overall. Parent-trace per action, semantic caching keyed on file-set, Secret Detection + Prompt Injection at the edit boundary, five-level budget hierarchy, versioned routing rollout.
  2. Portkey — best when the brief is “per-developer keys + a Composer dashboard by Friday.” Mature virtual-key + RBAC; verify the PANW acquisition timeline.
  3. Helicone — best for teams under 15 developers where Composer budgets aren’t yet a constraint. Drop-in proxy; treat as a planned migration after the March 3, 2026 Mintlify acquisition.
  4. LiteLLM — best when the Compose-action file-set cannot leave the network. Source-available Python proxy; pin past 1.83.7 after the March 24, 2026 PyPI compromise.
  5. Maxim Bifrost — best when raw burst throughput matters more than feedback loops. Go-based; data model is request-level.
  6. OpenRouter — best when Composer needs Grok, DeepSeek-Coder, Qwen-3 Coder, or other long-tail picks. Per-team chargeback is hand-wired.

Why Cursor Composer multi-file edits break dashboards

Composer is Cursor’s agentic mode. One instruction (“refactor auth middleware for OIDC across all routes”) expands into one large input context and either streams a single response editing multiple files or fans out N parallel file-edit operations. Six properties make this hard to monitor, budget, and secure with a chat-era gateway.

  1. One intent, N requests. A non-trivial cross-file migration on a 40-file workspace produces 1 to 12 model requests depending on planning depth. Per-call telemetry counts these as N API calls; per-developer telemetry counts them as N sessions. Neither tells finance what the action cost.

  2. Input context dominates output cost. An action touching 18 files ships 120K to 180K input tokens and returns 8K to 20K of diff, roughly 90 / 10. Most cost dashboards still privilege output tokens. For Composer, the input column is the conversation.

  3. Parallel edits create a request burst. Composer fans out 6 to 14 concurrent requests with a shared context. Naive gateways serialise them, buffer-and-batch streaming, or fail the burst halfway through.

  4. Mid-edit failure is common. Across 22 teams in Q1 2026, Composer’s partial-failure rate hovered at 6 to 9 percent, almost always 3 of 5 edits applied and the fourth failed validation. The gateway has to retry only the failed sub-edit.

  5. Compose complexity varies 40x within one day. The same engineer runs a 3-file rename (15K tokens, haiku suffices) and a 28-file refactor (175K tokens, only opus or gpt-5-codex keeps coherent state). Routing every action to the largest model is the most common over-spend pattern.

  6. The prompt is full of secrets. A Composer prompt is the developer’s working set, not a polished query. It often contains a fresh .env, an OAuth refresh token pasted into a comment, or a hardcoded API key a junior engineer hasn’t noticed. IDE-side detection catches a fraction; at the provider, the secret has already left. The gateway is the only layer with the right vantage.

All six picks support Cursor’s Custom API endpoint as of May 2026. None get all seven axes right out of the box.

The 7 axes we score on

AxisWhat it measures
1. Per-Compose-action attributionGroup N model requests behind one parent action trace, not per API key
2. Semantic caching on file-setCache by file-set + instruction embedding so retries and near-duplicates hit cache
3. Secret scanning at the edit boundaryScan inbound prompts for API keys, credentials, and prompt injection before the request leaves your perimeter
4. Retry + partial-edit handlingWhen 3 of 5 edits succeed and one fails, retry only the failed sub-edit without double-billing
5. Routing by Compose complexityRead input-token count and planning depth to pick between haiku, sonnet, opus, and codex
6. Per-developer / per-team budgetsSoft warn at 80 percent, hard block at 110 percent, per developer or per team
7. Streaming continuity under burst loadSSE pass-through survives 6 to 14 concurrent requests without buffer-and-batch

We started from gateways shipping an OpenAI- or Anthropic-compatible endpoint Cursor’s Custom API can target. We removed gateways that buffered streaming under concurrent load (broke the diff preview) and gateways whose Anthropic tool-block passthrough re-serialised content under load (broke gpt-5-codex and claude-opus-4-7 tool calls on bursts). Each remaining gateway was tested across three workloads: a 12-developer fintech team running service refactors, a 60-developer platform team running cross-repo migrations, and a 4-developer regulated team running Composer on patient-data adjacent code.

1. Future AGI Agent Command Center: best for action-level attribution, semantic caching, and secret scanning at the edit boundary

Verdict. Future AGI treats a Compose action as a first-class span wrapping every sub-request fired during the action. Three things matter most for multi-file edits: semantic caching keyed on the file-set + instruction embedding eats the 200K-token re-ship problem; Secret Detection and Prompt Injection sit on the inbound path before the request leaves your perimeter; per-developer virtual keys with a five-level budget hierarchy (org, team, user, key, tag) make Composer spend recoverable per engineer.

What it does for Cursor Composer:

  • Per-Compose-action attribution. Set fi.attributes.compose.action_id once in the workspace JSON; sub-requests inherit it. The file set lives on the parent as a queryable span attribute.
  • Semantic caching on the file-set context. Exact caching (Redis) catches verbatim retries; semantic caching (Qdrant or Pinecone, 0.93+ similarity on text-embedding-3-large) catches paraphrased instructions against the same file set, the dominant Composer pattern. Across the 22 teams in Q1 2026, semantic caching produced 18 to 31 percent cost reduction on Composer-heavy traffic.
  • Secret scanning + prompt injection at the edit boundary. Built-in Secret Detection (pattern + entropy for API keys, cloud credentials, JWTs) and Prompt Injection run inline. A high-confidence match returns a structured 4xx to the IDE with the rule that fired. Protect adapters (~65 ms text median per arXiv 2510.13351) add no perceptible latency over provider RTT.
  • Sub-edit-aware retry. N sub-requests are siblings under one action; when one fails, only the failed sub-edit retries. Partial-edit retry rates dropped from 6.4 to 1.9 percent across the 22 teams.
  • Routing by Compose complexity. Default policy: under 15K tokens to claude-haiku-4-5 or gpt-5-mini; 15-50K to claude-sonnet-4-6; 50K+ to claude-opus-4-7; cross-file intent to gpt-5-codex. Versioned, 10 -> 50 -> 100 percent rollout, auto-rolled back on regression.
  • Five-level budgets. A $400 monthly soft cap pages at 80 percent; a CI key with a $20 daily hard cap returns a structured 429 the moment it’s blown.
  • Burst load. Confirmed against the 14-concurrent-edit burst Cursor 2.4 produces. Benchmarked Go runtime hits about 29k req/s with P99 at 21 ms on a t3.xlarge with guardrails on per the future-agi/future-agi README.

Where it falls short: agent-opt is opt-in (start with traceAI + ai-evaluation, turn the optimizer on once baselines stabilise). Diff replay view is less polished than Helicone’s per-request inspector. Compose-specific span attributes are convention-driven, not standardised across gateways.

Pricing: Free tier with 100K traces/month. Scale at $99/month. Enterprise custom with SOC 2 Type II, HIPAA, GDPR, CCPA per the trust page, ISO/IEC 27001 in active audit, SSO, RBAC, BAA, AWS Marketplace. traceAI, ai-evaluation, agent-opt are Apache 2.0.

Score: 7/7 axes.

2. Portkey: best for hosted virtual keys, RBAC, and a Composer dashboard by Friday

Verdict. Portkey is the most polished hosted-only product for Cursor workloads when the brief is “stand up per-developer keys and a dashboard fast.” Strength is mature virtual-key management and per-key RBAC. The limitation is that the Compose action isn’t a first-class unit in the data model, semantic caching is exact-match by default, and secret scanning is a separate plugin. Portkey was acquired by Palo Alto Networks on April 30, 2026; verify standalone continuity before a multi-year contract.

What it does for Cursor Composer: Per-Compose-action attribution via trace_id header (workspace JSON sets a Compose UUID; otherwise key-level grouping blends actions); semantic caching available as a paid add-on with a third-party vector store; secret scanning via Lakera plugin (separate hop); retry handling is action-level only (a retry costs the full action’s input context); routing by complexity via conditional rules (token-budget yes, planning-depth needs a custom header); streaming confirmed on Cursor 2.4 with claude-opus-4-7 and gpt-5-codex; per-team budgets via per-key caps + Slack.

Where it falls short: No optimizer; routing updates are manual edits in the UI. Flat trace data model makes Compose-action-as-parent a custom wiring exercise. Pricing escalates faster than alternatives past 5M requests/month. PANW timeline is a procurement risk.

Pricing: Free tier with 10K requests/day. Scale at $99/month. Enterprise custom with SOC 2 Type II, SSO, BYOC.

Score: 5/7 axes (missing: native action-level model, native semantic caching).

3. Helicone: best for lightweight per-request observability on small teams

Verdict. Helicone is the right pick when the brief is “show me what each Composer request cost” and the team is under 15 developers. Simplest drop-in here. For Compose-action-level rollups it’s the shallowest, because Composer isn’t a Helicone concept. Helicone was acquired by Mintlify on March 3, 2026; the cost-platform roadmap shifted toward documentation. Treat existing usage as a planned migration window.

What it does for Cursor Composer: Per-Compose-action attribution via Helicone-Session-Id; semantic caching available, exact-match-keyed; secret scanning is not native (regex only); per-request inspection is Helicone’s strongest feature; retry is basic; complexity routing is absent (observability-first); streaming confirmed on Cursor 2.4 for moderate bursts, heavy bursts (10+ concurrent edits) occasionally trigger Helicone’s rate-limit middleware; per-team budgets via usage alerts only.

Where it falls short: No optimizer, no Compose-aware routing, no first-class secret scanner. Self-host scales to a few hundred RPS. Mintlify reshaped the roadmap; cost-platform features are in maintenance as of May 2026.

Pricing: Free tier with 10K requests/month. Pro at $25/month. Enterprise custom.

Score: 4/7 axes (missing: native secret scanning, optimizer, complexity-aware routing).

4. LiteLLM: best for self-hosted Composer when the file-set cannot leave the VPC

Verdict. LiteLLM is the pick when the security team requires Compose-action context never to leave the VPC. Source-available (MIT, enterprise directory licensed separately), Python-native. Data ownership is strongest; dashboard story is weakest. Pin past 1.83.7 after the March 24, 2026 PyPI supply-chain incident on 1.82.7 and 1.82.8; rotate credentials touched by either tagged version.

What it does for Cursor Composer: Per-Compose-action attribution via metadata pass-through; semantic caching configurable with in-memory or Redis (production-ready, not embedding-based by default); secret scanning via configurable hooks; retry configurable but not Compose-aware out of the box; routing by complexity via conditional config (token-budget works, planning-depth requires a custom router, about 100 lines of Python); streaming confirmed on Cursor 2.4 with claude-opus-4-7 on 1.83.7+; per-team budgets via spend tracking with webhook alerting.

Where it falls short: No optimizer. UI is functional, not polished. March 2026 PyPI incident is a real trust signal. Observability is thinner than Portkey or Helicone; wire traceAI (Apache 2.0) behind LiteLLM for trace depth.

Pricing: Open source under MIT. Enterprise with SLA, SSO, audit starts around $250/month.

Score: 5/7 axes (missing: optimizer, embedding-based caching out of the box).

5. Maxim Bifrost: best for raw burst throughput under heavy Composer load

Verdict. Bifrost is the pick when the binding constraint is raw P99 under a 14-concurrent-edit burst on a large refactor. Go-based, multi-tenant, in the same throughput class as Future AGI. The data model is request-level, not action-level; the Compose-action-as-parent rollup has to be wired by convention. Strong throughput, shallow feedback loop. Reasonable pick when a separate evaluation + observability stack is already in place.

What it does for Cursor Composer: Per-action attribution via request metadata (functional, not first-class); semantic caching as an optional plugin; secret scanning via third-party adapters (Lakera, AWS Bedrock Guardrails); retry at request level; routing by complexity via YAML rules; streaming continuity strong; per-team budgets via per-key caps + webhooks.

Where it falls short: Request-level data model means Compose-action-as-parent is convention. No optimizer. Semantic caching and secret scanning are plugin-driven, not core.

Pricing: Open source. Hosted and enterprise custom.

Score: 4/7 axes (missing: native action model, native semantic caching, optimizer).

6. OpenRouter: best for Composer with non-Anthropic and non-OpenAI models

Verdict. OpenRouter is the pick when Composer has a real reason to hit beyond the Anthropic + OpenAI duopoly. Grok for adversarial reasoning, DeepSeek-Coder for low-cost long-context, Qwen-3 Coder for self-host-friendly code-gen. Widest catalogue; weakest team-spend story. Consumer-facing first.

What it does for Cursor Composer: Per-action attribution via request metadata; semantic caching not native; secret scanning not native; retry is cross-provider failover; routing by Compose complexity is OpenRouter’s strongest single feature with a DSL supporting input-token thresholds, model-availability fallback, and cost-per-token selection across 200+ models; streaming confirmed on Cursor 2.4 with mainstream models; per-team budgets via per-key credit balances.

Where it falls short: Consumer-facing first. Per-team SSO chargeback is wired by hand. No semantic caching, no secret scanning, no optimizer. Cost variance across the long-tail catalogue is real. For a regulated team, the data-handling story across 200 providers isn’t compliance’s picture.

Pricing: Pay-as-you-go credits; small markups on community providers. BYOK virtual-key mode supported.

Score: 3/7 axes (missing: native action model, semantic caching, secret scanning, optimizer, polished team budgets).

Capability matrix

AxisFuture AGIPortkeyHeliconeLiteLLMBifrostOpenRouter
Per-Compose-action attributionNative parent spanHeader trace_idHeader sessionMetadata conventionMetadata conventionMetadata convention
Semantic caching on file-setEmbedding-keyedPaid add-onExact-matchConfigurablePluginAbsent
Secret scanning at edit boundaryNative Protect (~65 ms)Lakera pluginRegex onlyConfigurable hook3rd-party adapterAbsent
Sub-edit retry handlingSub-edit-awareAction-level onlyBasicBYO middlewareRequest-levelCross-provider failover
Routing by Compose complexityfi.opt policy engineConditional rulesAbsentConditional configYAML rulesWidest catalogue
Per-developer budgets5-level + 429Per-key + SlackAlert-onlyWebhook + per-keyPer-key capConvention
Feedback loop / optimizerfi.opt (Apache 2.0)NoneNoneNoneNoneNone
Self-host postureSingle Go binary, Apache 2.0BYOCOSSOSSOSSHosted only
2026 trust signalApache 2.0, no acquisitionPANW pendingMintlify acquiredMarch PyPI incidentIndependentIndependent

The semantic-caching and secret-scanning columns separate the field on the multi-file-edit-specific cost and compliance story today. The feedback-loop column separates it on the longer-term Composer cost story.

Decision framework: choose X if

Future AGI Agent Command Center if Composer is a meaningful line item ($15K+/month on multi-file edits) and the goal is more than a chargeback table. Semantic caching on the file-set context typically pays for itself in weeks one to two; the optimizer compounds from there.

Portkey if the brief is hosted-only, virtual-key-heavy, RBAC-mature, ship-next-Friday. Accept the flat trace data model and plan for the PANW acquisition.

Helicone if the team is under 15 developers and the goal is per-request observability, not multi-file edit governance. Verify the Mintlify roadmap fits your six-month plan.

LiteLLM if security requires Compose-action context to never leave the VPC. Pin to 1.83.7+; pair with traceAI for trace depth.

Maxim Bifrost if raw burst throughput is the binding constraint and a separate observability + eval stack is already in place.

OpenRouter if Composer needs models beyond the Anthropic + OpenAI duopoly and chargeback can be hand-wired.

Common mistakes when wiring Composer through a gateway

MistakeWhat goes wrongFix
Counting each parallel edit as a sessionChargeback shows 14 “sessions” per action; finance asks whyWire a Compose action UUID; use the gateway’s parent-trace concept
Buffering streaming responsesDiff preview freezes mid-edit; developers re-run and double-billConfirm SSE forwards without buffer-and-batch; load-test with a 12-concurrent burst
Caching exact-match onlyParaphrased instructions over the same file set miss; cache hit rate stays under 10 percentSemantic caching with a 0.93+ threshold on text-embedding-3-large
Routing every action to claude-opus-4-7Cost spike of 6 to 10x versus the optimal mixToken-budget routing: under 15K to haiku, 15-50K to sonnet, 50K+ to opus or gpt-5-codex
Retrying the whole action on one sub-edit failureInput context shipped twice; cost doubles on a 6 percent partial-failure eventSub-edit-aware retry middleware
Trusting IDE-side secret detection aloneFresh .env files and pasted credentials still ship to the providerRun Secret Detection at the gateway, inbound, before the perimeter
Setting Compose budgets too tightComposer pauses mid-refactor; developer flow breaksSoft warn at 80 percent, hard pause at 110 percent, senior-engineer override

How Future AGI closes the loop on Compose actions

The other five gateways treat Compose-action attribution as an end state: capture trace, show dashboard, alert on budget. Agent Command Center treats the trace as input to a loop. traceAI emits the parent span; ai-evaluation scores it on task-completion, code-correctness, and tool-use accuracy; low-scoring actions cluster by failure mode; agent-opt rewrites the system-prompt or adjusts routing against the clusters; the gateway applies the policy on the next request, versioned, 10 -> 50 -> 100 percent rollout.

Two clusters account for most Composer waste across the 22 teams: “opus called when sonnet would have produced the same diff” (about 32 percent of waste) and “Compose ran across 28 files when 8 were enough” (about 26 percent). Token reduction from prompt tightening alone runs 9 to 14 percent.

Net effect in Q1 2026: teams starting at $18K to $32K/month on Composer spend saw costs trend down 22 to 36 percent within four weeks. Partial-failure rates dropped from 6.4 to 1.9 percent. Median per-action latency stayed within +/- 8 percent. No developer changed how they used Composer.

Ready to put a gateway in front of Cursor Composer? Point Cursor’s Custom API at https://gateway.futureagi.com/v1, issue one virtual key per developer, attach a budget, turn on semantic caching and Secret Detection. The Agent Command Center quickstart walks the setup; the caching and guardrails pages cover the rest.

What we did not include

  • Kong AI Gateway. Strong if you already run Kong; Compose-specific observability is plugin-driven, chargeback wiring closer to two weeks than two days.
  • Cloudflare AI Gateway. Strong worker primitives; Compose-action attribution + per-team budgets require custom worker code as of May 2026.
  • TrueFoundry. Strongest cross-team rollup; Composer-specific story (parent-child trace, file-set observability, semantic caching) is thinner.

Sources

  • Cursor Composer documentation, cursor.com/docs/composer (Cursor 2.x, Custom API mode, Business plan)
  • Future AGI Agent Command Center, futureagi.com/platform/monitor/command-center
  • Future AGI traceAI, ai-evaluation, agent-opt (Apache 2.0), github.com/future-agi
  • Future AGI Protect latency benchmarks, arxiv.org/abs/2510.13351
  • Portkey, portkey.ai; PANW intent to acquire (April 30, 2026)
  • Helicone, helicone.ai; Mintlify acquisition (March 3, 2026)
  • LiteLLM, github.com/BerriAI/litellm; Datadog Security Labs PyPI writeup (March 24, 2026)
  • Maxim Bifrost, getmaxim.ai/bifrost
  • OpenRouter, openrouter.ai

Frequently asked questions

Why does Cursor Composer need a different gateway than chat or Tab autocomplete?
Composer's multi-file edit pattern moves the cost from prompt to context. A single action on a real codebase pulls 10 to 30 files, ships 50K to 200K input tokens, and fans out N parallel file-edit requests on the response. Per-call telemetry treats those as N separate API calls. Per-developer telemetry blends them into a noisy session count. Neither captures the action, which is the real unit of cost, the real unit of failure, and the real unit a finance team needs to see. A Composer-aware gateway groups the N child requests under one parent action span, caches the shared file-set across retries, redacts secrets at the edit boundary before they leave your perimeter, and enforces a per-developer budget cap that returns a structured 429 the moment it's blown. Tab autocomplete needs none of that.
How do per-developer budgets work when a 40-engineer team shares one Cursor account?
The gateway issues one virtual key per developer (or per team, per CI runner, per feature flag) and tracks spend against each one independently. Future AGI Agent Command Center supports a five-level hierarchy: org, team, user, key, tag. A request inherits the lowest applicable ceiling. A developer with a $400 monthly soft cap on Composer gets paged at the warn threshold (default 80 percent). A platform-team cap that's been blown by a runaway refactor returns a structured 429 the moment it's tripped. A CI key gets a hard daily cap so the agent that loops in a test job can't sink the month. The audit log shows which developer's key paid for which `apply_patch` turn on which file.
How does semantic caching cut Composer cost?
Composer ships the same file-set context across retries and across closely related actions. A 14-file refactor that fails on sub-edit 4 of 5 is a 200K-token re-ship if the gateway re-runs the whole action. Semantic caching keys on the embedding of the file-set plus the instruction; the second action hits a cache and returns at near-zero token cost. Across the 22 teams we observed in Q1 2026, semantic caching produced 18 to 31 percent cost reduction on Composer traffic. Exact caching (key on raw prompt) is faster but misses paraphrased instructions; semantic caching with a tight similarity threshold (0.93+ on `text-embedding-3-large`) is the right default for code-edit workloads.
What is the partial-edit retry problem?
When Composer fans out 5 file-edit calls and the fourth fails validation, naive gateways re-run the whole action and re-ship the full 120K-token input context twice. The same five files, the same instruction, the same context payload. A Compose-aware gateway retries only the failed sub-edit, credits it to the same parent action, and avoids the double-bill. Of the gateways in this list, Future AGI ships sub-edit-aware retry natively as of May 2026; the others either retry at the action level (Portkey), need middleware wiring (LiteLLM), or treat retry as cross-provider failover (OpenRouter).
Where should the secret scanner run for Composer prompts?
At the gateway, on the inbound request before it leaves your perimeter. Composer's input is the highest-sensitivity payload in the IDE: 10 to 30 files of source code, sometimes a fresh `.env`, occasionally an AWS access key a developer pasted into a comment while debugging. IDE-side detection catches a fraction. Provider-side detection catches none, because the secret has already been transmitted. Future AGI Agent Command Center runs Secret Detection and Prompt Injection scanners in the request path with a verdict span attached to the trace. A high-confidence match returns a structured `4xx` to the IDE with the rule that fired. The Protect adapters (about 65 ms text median per [arXiv 2510.13351](https://arxiv.org/abs/2510.13351)) add no perceptible latency over provider RTT.
Why does Composer burst-load break some gateways?
A 14-file action produces a burst of 14 concurrent requests with a shared 150K-token context. Naive proxies serialise them and double latency. Buffer-and-batch SSE proxies freeze the diff preview mid-edit. Key-level rate-limit middleware fails the burst halfway and the developer re-runs the whole action. Load-test with a synthetic 14-concurrent burst against the gateway before rollout. Future AGI's benchmarked Go runtime hits about 29k req/s with P99 at 21 ms on a `t3.xlarge` with guardrails on; Bifrost is in the same class. Python-based proxies (LiteLLM) typically need more replicas to absorb the same burst.
Is it safe to send proprietary code through a hosted gateway running Composer?
For a hosted gateway the flow is IDE -> gateway -> model provider, and both see the code. If compliance restricts both, the only safe path is self-hosted (LiteLLM in your VPC, or Future AGI's self-host Go binary inside an air-gapped network). Compose-action context is the highest-sensitivity payload in the IDE, full file contents across 10 to 30 files, so gateway selection matters more here than for Tab autocomplete. Future AGI ships a single Apache 2.0 Go binary that runs under Docker, Kubernetes, or fully air-gapped; SOC 2 Type II, HIPAA, GDPR, and CCPA certified per [the trust page](https://futureagi.com/trust); ISO/IEC 27001 in active audit.
Related Articles
View all