Detection Coverage

64 Patterns Across 7 Categories

Every rule mapped to OWASP LLM Top 10 with remediation hints
🛡

Prompt Injection

Ignore-previous, role hijacking, instruction override, DAN

10 patterns · OWASP LLM01
🎭

Jailbreak Bypass

Evil roleplay, developer mode, grandma exploit, no-restrictions

6 patterns · OWASP LLM01
🔑

PII Leakage

Credit cards, SSN, API keys, My Number, JP phone, bank accounts

12 patterns · OWASP LLM06
💉

SQL Injection

UNION SELECT, DROP TABLE, stored procs, stacked queries

8 patterns · OWASP LLM02
📤

Data Exfiltration

Unauthorized data transfer, encoding tricks, URL smuggling

5 patterns · OWASP LLM06
🔓

Prompt Leak

System prompt extraction, verbatim repetition, indirect inquiry

7 patterns · OWASP LLM07
💥

Token Exhaustion

Repetition flooding, Unicode noise, null-byte stuffing, context overflow

5 patterns · OWASP LLM10
100%
Benchmark Precision
53/53 attacks · 0 false positives