![]() |
|
:: WaveInform™ / WaveReturn™ — API Documentation
| HOME | DEMO | TERMS |
: Orientation
Faces of the same service:
➤ WaveInform™ prepares structured or unstructured inputs for safe LLM ingest and multi-step AI workflows.
It performs deterministic boundary preparation — stabilising inputs without interpreting or modifying their intent.
➤ WaveReturn™ is called via its own endpoint. It verifies continuity after transformation or LLM return. It does not reverse-translate. Instead, it confirms boundary integrity before downstream processing continues.
➤ WaveTransform™ provides both services in one via a convenience endpoint.
The API is optimised for agent chains, multi-model routing, and parsable compression. Its operate strictly within the scope of the input you provide.
: What WaveInform Is
WaveInform provides:
- Deterministic boundary preparation across model environments
- Reduced downstream variance
- Stable input preparation for multi-step pipelines
- Reusable transformation artifacts
: Design Principle
WaveInform and WaveReturn are distinct mutation boundaries.
- Each emits its own deterministic Receipt v1.0 envelope.
- Verification does not recompute transformation.
- Integrity is enforced through chain continuity and hash validation.
Note:
➤ WaveReturn requires a prior WaveInform call
➤ It is not mandatory to use both endpoints.
If you only need boundary preparation for LLM ingestion and to remain within that domain, one call to WaveInform is sufficient.
WaveReturn is recommended when:
- Crossing transport boundaries
- Verifying post-hop continuity
- Preparing artifacts for parsable compression
- Returning to a relay or pipeline stage
Architecturally:
➤ prepare → X. One boundary crossed = One call
➤ + verify → Y. Two boundaries crossed = Two calls
➤ If using the dual endpoint → transform = X + Y = Two call bundle_discount.
: Typical Use Cases
WaveInform is suited for workflows where meaning must remain stable across steps, such as:
- Agent chains and swarms
- Long or multi-stage pipelines
- Cross-model or cross-vendor routing
- Compliance-sensitive or high-stakes inputs
- Reusable prompts, instructions, or policies
: Best Practice
- Use WaveInform at the start of multi-step workflows
- Cache normalised outputs for reuse
- Store your receipts when auditability matters
- Treat normalised outputs as immutable inputs to downstream stages
- Pair with WaveReturn for cross-hop integrity
: Getting Started
- Review the request / response schema
- Try the demo on a controlled input
- Integrate into the start or relays nodes of your pipeline
For production access, see the main API access page.
: Basic Usage
➤ WaveInForm and WaveReturn or the bundled Transform combination are accessed via dedicated POST endpoints.
➤ WaveReturn accepts a chain reference and output hash, and verifies continuity.
➤ Respectively the ACCEPT semantic input payloads, and RETURN a normalised transport-safe representation for reuse / downstream processing.
|
|
|
|
: WaveInform API
|
|
: WaveReturn API
|
|
: Response (success)
➤ A successful response returns a normalised semantic payload along with optional receipt metadata.
|
|
: The Receipt
➤ WaveInform can return a receipt object that documents the outcome of the normalisation step.
|
Receipts are designed for:
|
: Error Model
|
: Failure Response Examples
➤ WaveInform uses explicit, bounded error responses. Failures never return partial or ambiguous output.
|
❌
❌
❌
❌
|
: Limits & Guardrails
WaveInform enforces strict boundaries to ensure predictable behaviour.
Input Limits
- Maximum input size enforced
- Structured validation prior to processing
- Rejection of malformed payloads
- Bounded semantic scope
- No free-form generation
- No external data access
- Stable structure
- No hidden fields
- No silent mutation
- No adaptive variation across identical inputs
: Privacy & Data Handling
WaveInform / WaveReturn is designed with minimal data exposure.
- Inputs are processed ephemerally
- No training on customer data
- No secondary use of payloads
- No cross-request retention
Receipts may be safely stored by the client for audit or compliance purposes. For full details, see the Maenen privacy policy.
: Capability Scoping
Some API capabilities are gated by key scope. Keys without the requisite scope will receive:
403 capability_not_permitted |
Some capabilities may instead return payment or quota challenges depending on key tier.
: Edge Rate Enforcement
Rate limits are applied at the network edge (via NGINX). Excess traffic will receive:
429 Too Many Requests |
These limits are distinct from usage ceilings and do not imply SLA guarantees.
: Support
For technical issues or questions, contact support via the site. Note that during beta trial, full support and any SLA is not offered, though your query or comment will be carefully considered. Please include:
- A short description of the issue
- Example payloads (if possible)
- The receipt from the relevant request
: Beta Notes
This API is currently in limited beta.
- Supported modes and limits may evolve
- No uptime or performance guarantees are implied
- Breaking changes will be communicated ahead of time where possible
: Versioning
This documentation applies to:
|

