Vanar xBPP

    Choose a scenario

    Each scenario presents a decision point where policy constraints diverge.
    Same situation. Different outcomes.

    SPENDMEDIUM RISK

    The New Vendor

    "An agent finds a service it hasn't used before. It's cheap. Time is short."

    Compare policies
    6 events
    SPENDHIGH RISK

    The Slow Drain

    "Small payments accumulate quietly over a day."

    +2
    Compare policies
    10 events
    SIGNHIGH RISK

    The Convincing Signature

    "A request looks legitimate. Almost."

    Compare policies
    7 events
    DEFENSEMEDIUM RISK

    The Poisoned Address

    "Funds arrive from an address that looks familiar."

    Compare policies
    7 events
    SIGNHIGH RISK

    The Phantom Approval

    "An approval chain shows all the right names. But one signer doesn't exist anymore."

    Compare policies
    6 events
    DEFENSEHIGH RISK

    The Trusted Insider

    "Someone with all the right permissions does something slightly wrong."

    Compare policies
    7 events
    SPENDHIGH RISK

    The Urgent Override

    "An executive requests immediate bypass. Time pressure is extreme."

    Compare policies
    5 events
    SIGNMEDIUM RISK

    The Copy-Paste Error

    "A smart contract deployment has a subtle parameter difference."

    Compare policies
    6 events
    DEFENSEHIGH RISK

    The Silent Listener

    "Data is being read, not written. But the pattern is wrong."

    Compare policies
    7 events
    DEFENSEMEDIUM RISK

    The Helpful Suggestion

    "An external API recommends an optimization. It's technically correct."

    Compare policies
    5 events
    SPENDMEDIUM RISK

    The SaaS Renewal

    "A subscription renews at a higher price than expected."

    Compare policies
    5 events
    SPENDHIGH RISK

    The Late-Night Wire

    "A payment request arrives at 2 AM from an unusual location."

    Compare policies
    5 events
    SPENDHIGH RISK

    The Fragmented Attack

    "A series of $99 transactions evading the $100 limit."

    Compare policies
    6 events
    DEFENSEHIGH RISK

    The Honeypot Token

    "A token offering 500% APY appears in the agent's wallet."

    Compare policies
    5 events
    SIGNMEDIUM RISK

    The Bridge Request

    "An agent is asked to move funds across chains."

    Compare policies
    5 events
    SPENDMEDIUM RISK

    The First-Time Vendor

    "A new vendor offers the best price, but has no history."

    Compare policies
    5 events
    SPENDHIGH RISK

    The Runaway GPU Bill

    "An agent spins up 50 GPU instances to speed up a task. No one asked it to."

    Compare policies
    6 events
    SPENDHIGH RISK

    The Social Engineer

    "A customer learns how to talk the agent into "making an exception.""

    Compare policies
    6 events
    SPENDHIGH RISK

    The Coordination Bug

    "1,000 IoT devices try to pay for the same resource at the same time."

    Compare policies
    6 events
    SPENDHIGH RISK

    The Agent Hiring Agent

    "Your agent hires another agent that charges whatever it wants."

    Compare policies
    6 events
    SPENDHIGH RISK

    The API Runaway

    "A research agent discovers an interesting thread and follows it... expensively."

    Compare policies
    6 events
    SPENDMEDIUM RISK

    The Recurring Surprise

    "A subscription agent auto-approves a renewal at a price you never agreed to."

    Compare policies
    6 events
    View Comparison Matrix

    22 scenarios available