How It Works

Real-Time AI Protection That Never Sees Your Data

AegisPrompt is a lightweight Chrome extension that scans every prompt before it reaches an AI platform. Sensitive data is detected and blocked locally โ€” nothing ever leaves the browser.

1
๐Ÿ”

Detect

Scans every prompt in real time as your team types โ€” PII, API keys, financial data, and custom restricted terms.

2
๐Ÿ›ก๏ธ

Prevent

Blocks submission and shows a detailed warning. Employees can review and remove sensitive data before proceeding.

3
๐Ÿ“Š

Report

Every event is logged to the admin dashboard โ€” what was detected, where, and whether the user proceeded or canceled.

What AegisPrompt Detects

Multi-layered pattern matching with built-in validation to minimize false positives

๐Ÿ‘ค

Personally Identifiable Information

Catches the most common types of PII before they reach AI platforms.

  • โœ“Email addresses
  • โœ“Phone numbers
  • โœ“Social Security numbers
  • โœ“Physical addresses
  • โœ“Credit card numbers
๐ŸŽฏ Smart ValidationSSNs validated against invalid area codes (000, 666, 900+). Credit cards verified with Luhn algorithm. Phone numbers filtered to exclude false positives like credit card prefixes.
๐Ÿฆ

Financial Data

Protects banking and cryptocurrency identifiers from accidental exposure.

  • โœ“Bank account numbers
  • โœ“Routing numbers
  • โœ“Bitcoin wallet addresses
  • โœ“Ethereum wallet addresses
๐Ÿ”‘

API Keys & Secrets

Detects credentials and tokens that could compromise your infrastructure.

  • โœ“AWS access keys & secret keys
  • โœ“GitHub tokens (ghp_, gho_, ghu_ prefixes)
  • โœ“Google API keys
  • โœ“Slack tokens
  • โœ“Stripe keys
๐ŸŽฏ Smart ValidationAWS secrets must contain mixed-case and special characters to avoid matching generic hex strings. Each key type uses format-specific regex patterns.
๐Ÿ’ฌ

Sensitive Keywords

A built-in library of 50+ phrases that indicate sensitive context.

  • โœ“"social security number"
  • โœ“"api key" / "secret key"
  • โœ“"wallet seed phrase"
  • โœ“"crypto balance"
  • โœ“And 50+ more sensitive phrases
๐Ÿ”ง

Custom Detection Rules

Company admins can define restricted terms that are specific to their organization โ€” project codenames, internal product names, or confidential phrases. These rules are pushed to every employee's extension automatically and trigger on any match, case-insensitive.

How Detection Works Under the Hood

A multi-layered interception approach that catches sensitive data regardless of how the user submits

โŒจ๏ธ

Keyboard Input Monitoring

Watches keystrokes in real time and caches text as the user types โ€” so even if a platform clears the input field before submission, AegisPrompt still has the text to scan.

๐Ÿ–ฑ๏ธ

Send Button Interception

Catches send-button clicks using event delegation on mousedown, and intercepts Ctrl/Cmd+Enter keyboard shortcuts โ€” the two most common ways users submit prompts.

๐Ÿ“„

Form Submission Blocking

Intercepts form submissions at the DOM level using preventDefault and stopImmediatePropagation, ensuring the prompt never reaches the AI platform until it passes the scan.

๐Ÿ“ฆ

Large Prompt Handling

Prompts over 10,000 characters are automatically chunked into 5,000-character segments and scanned individually to avoid performance degradation. Custom phrases are scanned against the full text.

๐ŸŽฏ

False Positive Reduction

Every pattern has contextual validators โ€” SSNs exclude invalid area codes, credit cards must pass Luhn check, phone numbers exclude credit card prefix patterns, AWS secrets require mixed-case characters.

๐Ÿ”„

Platform-Specific Adapters

Each AI platform has unique input patterns โ€” textareas, contenteditable divs, different send button implementations. AegisPrompt detects and adapts to each automatically.

When Sensitive Data Is Found

1

Submission Blocked

The send action is immediately intercepted. The prompt does not reach the AI platform.

2

Warning Modal Displayed

A clear modal shows exactly what was detected โ€” data type, count, and a truncated example (limited to 20 characters for security).

3

User Decides

Two options: "Cancel & Review" to go back and remove sensitive data, or "I've Reviewed - Proceed" to explicitly acknowledge and send anyway.

4

Event Logged

Regardless of the user's choice, the detection event is logged to the admin dashboard โ€” what was found, where, and what action was taken.

Works Across 13+ AI Platforms

Automatically detects input fields and send mechanisms specific to each platform

ChatGPT
Claude
Google Gemini
Microsoft Copilot
Perplexity
Character.ai
Poe
You.com
Writesonic
Jasper
DeepSeek
Grok
Meta AI

AegisPrompt handles the unique input patterns of each platform โ€” textareas, contenteditable divs, and various send button patterns โ€” so protection works seamlessly regardless of which AI tool your team prefers.

Analytics Dashboard & Reporting

Complete visibility into AI usage and data exposure risk across your organization

๐Ÿ“ˆ

Detection Event Tracking

See every detection event across your organization โ€” what type of sensitive data was flagged, which AI platform it happened on, and whether the user proceeded or canceled.

๐ŸŒ

Platform Usage Insights

Understand which AI platforms your team actually uses, how frequently, and where the highest concentration of risk events occur.

๐Ÿ“‹

Audit-Ready Evidence

Generate reports showing that active controls are in place and working. Demonstrate to auditors and regulators that you take AI data governance seriously โ€” with data to back it up.

๐Ÿ“Š

Trend Analysis

Track detection patterns over time to identify whether risk is increasing or decreasing, which teams need additional training, and where to focus your security efforts.

What Gets Logged

Every detection event, warning, cancel, and proceed action is recorded with: the data types detected, counts, which AI platform it occurred on, timestamp, and user information. This gives admins a clear picture of where the real risks are โ€” and evidence that your controls are working.

Deployed in Minutes, Not Months

Two simple activation paths โ€” no MDM, no browser replacement, no IT tickets

๐Ÿ”‘

Activation Code

Admins generate activation codes (format: AEGIS-XXXX-XXXX). Employees install the Chrome extension, enter their code and work email, and they're protected immediately.

or
๐ŸŒ

Web App Login

Employees log in through aegisprompt.ai, which syncs authentication tokens to the extension via a secure frontend bridge. Tokens are validated for format, email consistency, and expiry before being accepted.

โฑ๏ธFull team protection in under 10 minutes
๐Ÿ”„Session validation with 5-minute cache โ€” no excessive API calls
๐Ÿ“ก24-hour offline grace period if backend is temporarily unreachable
๐Ÿ””Subscription status checked every 2 hours with clear messaging on lapses
๐Ÿ‘คRole-aware CTAs โ€” admins see "Reactivate," employees see "Contact Admin"
๐Ÿ›ก๏ธRate-limited authentication (10 requests per 60 seconds)

Built for Security Teams, by a Security Professional

Every architectural decision prioritizes data privacy and minimal permissions

๐Ÿšซ

What AegisPrompt Does NOT Do

It does not read, store, or transmit the actual prompt content. It only scans locally in the browser and reports metadata (detection types and counts). The full text of what the employee typed never leaves the browser.

๐Ÿ”’

Local-Only Scanning

All detection happens in the browser. Prompt content is never sent to AegisPrompt servers. Only anonymized metadata (detection types and counts) powers the admin dashboard.

๐Ÿ“‹

Manifest V3 / Minimal Permissions

Built on Chrome's latest extension architecture with only the permissions needed: activeTab, storage, notifications, alarms, and scripting. No broad host permissions.

๐Ÿงน

HTML Sanitization

All user-facing content in warning modals uses textContent assignment โ€” never innerHTML with raw input. Sensitive data examples are truncated to 20 characters.

๐Ÿ”

Secure Token Storage

Auth tokens stored in chrome.storage.local (not sync) to keep credentials off shared Chrome profiles. No hardcoded API keys โ€” backend validation uses extension ID + JWT.

โœ…

Token Validation

The auth bridge validates JWT format, checks email-claim consistency, and verifies token expiry before accepting any authentication โ€” preventing token injection or replay attacks.

See It in Action

Start your 30-day free trial and deploy AegisPrompt to your team in under 10 minutes.

๐Ÿ’ณ No credit card requiredโšก 2-minute deployment๐Ÿ“Š Analytics dashboard included