Bouclier.ai scans every request and streaming response to AI providers for prompt injection — before they reach the model. Runs entirely on your Mac. No data ever leaves your machine.
A System Extension routes AI API traffic through a local proxy on your Mac. Every request and response is inspected before reaching the provider — no code changes, no SDK, no cloud dependency.
Traffic to 10+ AI providers is automatically routed through Bouclier.ai. Works with any app — ChatGPT, Cursor, Claude, API calls. No configuration needed.
161 detection rules across 21 attack categories. Requests, query strings, and streaming responses are all inspected in real time.
Threats are neutralized inline — injections are redacted before reaching the model. Streaming attacks are terminated cleanly. Safe traffic passes through untouched.
Every release is tested against 442 real-world attack samples and 240 benign inputs. Detection quality is enforced in CI — regressions block the release.
Sourced from OWASP LLM Top 10, MITRE ATLAS, HackAPrompt, and red-team research from Anthropic, Microsoft, and leading AI security labs.
Attempted to override the AI’s instructions and extract its system prompt.
Injection disguised in French to bypass English-language detection.
Known jailbreak technique (Skeleton Key) attempting to disable safety guardrails.
Malicious instructions hidden in an MCP tool description, targeting SSH keys.
Deploy and configure via Jamf, Kandji, or Mosyle. Control intercepted domains, enforcement policy, and feature flags across your fleet.
Every scan event is logged locally and can be forwarded to your SIEM. Export a privacy-scrubbed diagnostics bundle for incident response.
Built with defense-in-depth: request size limits, strict input validation, and a published threat model covering every trust boundary.
AI responses are inspected in real time as they stream. If a threat is detected mid-response, the stream is terminated cleanly.
All detection runs locally. No cloud. No telemetry. No data leaves your machine.
The local CA key is stored encrypted in your Keychain, unique to your device, and removable anytime.
Scan logs never contain your prompts, responses, or API keys — only detection metadata.
Local storage with automatic rotation. You own your data.
Published threat model and privacy policy covering every trust boundary.
Download the DMG, drag to Applications, click Enable. Every AI request is protected from that moment.
Download for macOSmacOS 15+ · Apple Silicon & Intel · v0.2.6