JUMP TOLLM Detection and response apiPromptArmor - The Security Platform for using LLMsSign up for an API KeyData Sources that could have originated from attackersBasics of PromptArmor ArchitectureSetting up a ConfigBest Practices for using the PromptArmorSystem DiagramsDetectorsDefault Detectors (for all endpoints)Adversarial InstructionsAnomalyData ExfiltrationPhishingModifiable Input DetectorsCode InjectionHidden TextInvisible UnicodePIIHTML InjectionSecretsModifiable Output DetectorsCodeProfanityPIISecretsHidden TextInvisible UnicodeScriptsMarkdownModifiable Action DetectorsHidden TextInvisible UnicodeMalicious Code ExecutionPIISecretsEndpoints/v1/analyze/input/v1/analyze/output/v1/analyze/actionv1/analyze/action/outputDeprecatedGetting started with promptArmorLearn more about the threat landscapeBook A Threat AssessmentAutoGPT injection demo videoLLM PentestsSign up!Private BetaDeprecated EndpointsDetect PIIDetect ProfanityCheck ContentCheck URLPowered by System DiagramsLLM Application System without PromptArmor: LLM Application System with PromptArmor: