SOVEREIGN · GDPR · EU AI ACT READY

Run your AI-built app
inside your own infrastructure.

Generate production systems with AI. Deploy them on your Docker host, your Kubernetes cluster, your on-prem rack, or your air-gapped network. Standard code. Your data. No proprietary runtime between you and your customers.

Runtime
JVM · Python · JS
Self-host fee
€0 forever
Code escrow
Included
// deployment.topology SOVEREIGN
W BUILDER GENERATED · CODE · SCHEMA · DEPLOY CUSTOMER PERIMETER TLS · KMS · SSO INSIDE 0 OUTBOUND YOUR INFRASTRUCTURE · k8s · eu-central acme-prod · 12 services LIVE SOVEREIGN
0 PROPRIETARY RUNTIME · 0 PHONE-HOME
Designed for
GDPR · Article 32 EU AI Act NIS2 Schrems II safe SOC 2 Type I · in flight ISO 27001 · in flight
Why self-hosting matters

Five reasons sovereignty stopped
being optional in 2026.

Hosted AI builders generate code on someone else's runtime. For regulated industries, that's the part that breaks first — at the audit, at the data-residency review, at the renewal.

01 · DATA RESIDENCY

GDPR Article 32 demands real control.

"Appropriate technical measures" means knowing exactly where personal data lives, who can read it, and how it's encrypted in transit and at rest. With Weezzi self-hosted, your customer data never leaves your VPC.

EU only0 cross-border transfer
02 · EU AI ACT

High-risk systems need traceability.

The EU AI Act requires logging, technical documentation, and human oversight for high-risk applications. Hosted black-box generators don't expose what's needed. Self-hosted Weezzi gives you full code, full logs, full audit.

Article 12 · 13 · 14Full audit trail
03 · IP CONTROL

The code is yours. Not licensed back to you.

Standard Java, Python and JavaScript. Sitting in your Git. No proprietary DSL, no opaque runtime, no "export — but you'll need our enterprise plan to actually run it." If we disappear tomorrow, your apps keep running.

Source availableEscrow included
04 · ECONOMICS

Pricing that doesn't punish growth.

Bubble's WU pricing scales with usage. Outsystems charges per developer, per environment, per app. Weezzi self-hosted: pay for the Builder seats that build, run unlimited apps on infrastructure you already own.

vs. workload taxFlat license · no surprises
05 · PROCUREMENT

Pass the security questionnaire on the first try.

Banking, healthcare, defence, public sector. Their procurement teams already have a checkbox for "self-hosted, source-available, no third-party data processor." Weezzi was designed to tick that box on day one.

Procurement-readyDPA · BAA · custom
06 · BUSINESS CONTINUITY

Your platform doesn't end when ours does.

Acquisition, pivots, pricing changes, sunset announcements — every PaaS customer eventually lives one of these. Source escrow plus standard runtime means your apps survive any scenario, including ours.

Source escrowTriggers contractually defined
Deployment options

Four ways to run Weezzi.
Same platform. Same code.

From a single Docker container on a developer laptop to fully air-gapped clusters in regulated environments — same generated app, same operating layer, same standard runtime.

01 / 04

Docker

SINGLE-NODE · 5 MIN SETUP

The fastest path. One docker compose up brings the whole platform online — Builder, generated app, Postgres, observability — on any developer machine, VPS, or single-server deployment.

  • compose.yaml provided
  • x86_64 + ARM64 images
  • Bring-your-own LLM keys
  • Free forever
03 / 04

On-Premises

ENTERPRISE · YOUR DC

Annual license for fully on-premises deployment in your datacenter. Includes Builder seats, unlimited apps, BYOK AI integrations, SLA tiers, source code escrow. Engineered installation by Weezzi or partner.

  • From €24K/yr · Starter tier
  • VMware · OpenShift · bare-metal
  • SLA up to 1h response · 24/7
  • Source escrow included
04 / 04

Air-Gapped

DEFENCE · CRITICAL · ISOLATED

Fully offline operation for defence, critical infrastructure, and sovereign workloads. Local LLM inference (Llama, Mistral, Qwen). Signed offline update bundles. Hardened image. No outbound network required.

  • Local LLM only · zero egress
  • Offline signed update channel
  • FIPS-mode container option
  • +€50K setup · annual licence
What you actually get

Real software. Not a tenant
on someone else's runtime.

When other platforms say "self-hosted," they often mean "we let you run our proprietary runtime in your cloud." Weezzi means something stricter: you get the code, the schema, and the binaries — and we lose the ability to make you depend on us.

Standard, readable source code

Java (Spring Boot), Python (FastAPI), JavaScript (modern frontend). No proprietary syntax. Your team can read, debug, fork, and rewrite any part of it.

No proprietary runtime

Apps run on a JVM, a Python interpreter, and a Node process — that's it. No Weezzi sidecar required at runtime. No license check phoning home.

Full database schema · your tables, your migrations

Postgres schema generated by the platform. Versioned migrations live in your repo. Run them with Flyway, Liquibase, or your own CI — Weezzi tooling is helpful, never required.

Source escrow with contractual triggers

For Enterprise customers, full source is deposited with a third-party escrow agent. Release triggers — bankruptcy, sustained SLA failure, sunset notice — are spelled out in the MSA, not promised in marketing.

BYOK for every AI provider

Bring your own keys for OpenAI, Anthropic, Mistral, or self-hosted Llama / Qwen. No Weezzi-mediated inference, no usage logged on our side, no tokens passing through our infrastructure.

Observability built in · OpenTelemetry-native

Every generated app ships with structured logs, distributed traces, and Prometheus metrics out of the box — emitted in OpenTelemetry format. Pipe them straight into your existing Datadog, Grafana, ELK, or Splunk stack. Dashboards for request rate, error budget, and audit trail come pre-wired.

// your.infrastructure ISOLATED
YOUR PERIMETER · VPC / DATACENTRE 01 · GENERATED APP Frontend · API · Workers · Site Editor JVM 21 · Python 3.12 · Node 20 02 · DATA LAYER Postgres · Object Storage · Vector DB Encrypted at rest · backups in your bucket 03 · YOUR RUNTIME Kubernetes · Docker · VMware · bare-metal No Weezzi process · no callback · no telemetry STATUS · SOVEREIGN ✓
vs. the alternatives

Lovable. Bubble. OutSystems. Weezzi.
Where the runtime actually lives.

A short, honest comparison from a self-hosting perspective. We're not the fastest first prototype — we're the one you can take home.

Capability Lovable Bubble OutSystems Weezzi
Self-hosted production runtime No No Proprietary Docker · K8s · on-prem · air-gap
Generated code is standard, readable React + Supabase Visual logic only Proprietary Java · Python · JS
EU data residency guarantee Vendor-managed Vendor-managed EU regions Your VPC, your country
Air-gapped operation possible No No Limited Yes · local LLM
Source code escrow No No On request Included · Enterprise
Pricing model at scale Per message / month Workload Units $36K+/yr · per-app €0 self-host · flat license
BYOK for AI inference Limited Plugin-based AI Agent · vendor Any provider · local LLM
Lock-in if vendor disappears App stops App stops Migration project App keeps running
Comparison reflects publicly documented capabilities as of April 2026. Categories chosen for sovereignty-conscious buyers — not the full feature surface.
Security & enterprise

For the most sensitive deployments,
even the Builder moves inside.

Most customers self-host the generated apps and continue to use Weezzi Builder in our cloud. Enterprise and regulated buyers can take it one step further: deploy the Builder itself inside their perimeter — so AI generation, the editor, the runtime, and every byte of customer data never leave their network.

The full-perimeter option

Builder inside.
Apps inside.
Data inside.

For Enterprise on-prem deployments, the Weezzi Builder — the AI generation engine, the visual canvas, the Site Editor — installs alongside your generated applications. Prompts, source code, schemas, and inference all happen on your infrastructure. We can leave the building entirely.

CUSTOMER PERIMETER · NO OUTBOUND WEEZZI BUILDER On-prem AI generation Visual canvas Site Editor Local LLM ENTERPRISE EDITION GENERATED APPS 12 services JVM · Python · JS CUSTOMER DATA Postgres · S3 Encrypted at rest YOUR STACK SSO · Okta / Entra Vault · sealed-secrets Datadog · Grafana SIEM · Splunk Backup · Veeam EXISTING TOOLING ✕ BLOCKED · weezzi.com ✕ BLOCKED · public llm ✕ BLOCKED · telemetry
Available on Enterprise Edition Builder + apps + data, fully on-prem · zero outbound · BYOK or local LLM

Builder deployed inside your perimeter

The full Weezzi Builder runs on-prem alongside your generated apps. AI generation, prompts, schemas, source code, and edits never leave your infrastructure. The most sealed deployment we offer.

ENTERPRISE

SSO & identity federation

OIDC and SAML 2.0 via Okta, Microsoft Entra, Keycloak, Authentik, or Ping. RBAC mapped to your existing AD/LDAP groups. SCIM provisioning included.

Standard

Secrets · KMS · encryption

HashiCorp Vault, AWS KMS, Azure Key Vault, sealed-secrets. AES-256 at rest, TLS 1.3 in transit. Customer-managed keys for every encryption boundary.

Standard

Audit log · immutable trail

Every Builder action, every Site Editor change, every API call recorded with actor, timestamp, payload diff. Streamed to your SIEM. WORM-storage compatible. EU AI Act Article 12 ready.

Standard

FIPS-mode & hardened images

FIPS 140-3 validated crypto modules. Distroless container images. CIS-benchmarked Kubernetes manifests. Signed releases (cosign) and SBOMs (CycloneDX) for every artifact.

ENTERPRISE

SLA · 1h response · 24/7/365

Mission-critical SLA on top of the Enterprise license. Named technical account manager. Quarterly architecture reviews. Penetration test reports on request.

ENTERPRISE
Deployment guide · preview

From signed contract
to running cluster.

A regulated mid-market deployment, end to end. The full guide ships with the engagement; this is the shape of it.

5-step path

Predictable. Boring.
That's the point.

1

Architecture review

Two sessions. Network topology, identity provider, secret management, observability stack, backup policy. Output: a deployment plan signed by your security team.

2

Provision your namespace

Helm chart applied to your cluster. Postgres, MinIO/S3, Redis, OpenSearch deployed inside your VPC. Zero outbound dependencies beyond container registries you control.

3

Connect identity & secrets

SSO via OIDC (Okta, Entra, Keycloak, Authentik). Secrets via Vault / AWS SM / sealed-secrets. RBAC mapped to your existing groups, not a Weezzi user table.

4

Generate first app

Open the Builder. Prompt or import. Generated repo lands in your Git, not ours. CI runs your existing pipelines on it.

5

Cut the cord

Final firewall pass. Disable any outbound to Weezzi. Confirm offline operation. Hand over runbooks. You're sovereign.

weezzi-prod-01 · ~/deploy
# 1. Pull the official chart $ helm repo add weezzi https://charts.weezzi.com ✓ "weezzi" added · 14 charts indexed   # 2. Configure the deployment $ cat values.yaml   domain: weezzi.acme.internal   region: eu-central   network:     egress: false # air-gapped   llm:     provider: "local"     model: "qwen2.5-72b-q4"   escrow: enabled   # 3. Install $ helm install weezzi weezzi/builder -f values.yaml ✓ namespace/weezzi created ✓ 23 manifests applied ✓ postgres-cluster · 3/3 ready ✓ builder-api · 4/4 ready ✓ runtime · 6/6 ready ✓ site-editor · 2/2 ready   → Live at https://weezzi.acme.internal → Egress to weezzi.com: BLOCKED ✓ $
Talk to us

Sovereignty isn't a feature flag.
It's an architecture decision.

Book a 30-minute deployment briefing with our solutions team. We'll review your security posture, your compliance scope, and the deployment topology that fits — Docker, Kubernetes, on-prem, or air-gapped.

TYPICAL ENGAGEMENT · 4–6 WEEKS FROM SIGNATURE TO SOVEREIGN PRODUCTION