Raven operates after the query is constructed, at execution time inside the application - not at the network edge. This makes Raven immune to query obfuscation, encoding tricks, parameter smuggling and AI-generated payloads.
If the execution is malicious, it’s blocked.