Detect
We scan requests for emails, API keys, passwords, and other sensitive values.
Outgate Guardrails sit in the gateway path, scan request bodies for personal information and credentials, and replace matched values with stable placeholders before traffic reaches the upstream model.
Responses are restored on the way back to the client, while logs and upstream providers stay free of raw secrets and personal data.
Hey pii_3e8d1cName, please send the invoice to pii_8f3a2bEmail and CC pii_c4d1e9Email. My phone is pii_7b2f4aPhone.
DB_USER=cred_u2x4k1Username DB_PASS=cred_a1b2c3Password DB_HOST=cred_h3j5m7Server API_KEY=cred_d4e5f6API Key AWS_SECRET=cred_g7h8i9AWS Key
Sure, I'll send the invoice to pii_8f3a2b and CC pii_c4d1e9.
The database connection uses credentials cred_a1b2c3 at the specified endpoint with key cred_d4e5f6.
We scan requests for emails, API keys, passwords, and other sensitive values.
Sensitive values are replaced with stable placeholders before the model sees them.
Responses are mapped back to the original values before returning to the client.
Emails, phone numbers, names, addresses, and identifiers.
API keys, tokens, passwords, and environment secrets.
Models never see raw sensitive data. Your users still do.
Protect repo paths, env values, and prompts
Keep sensitive data out of logs by default
No rewrites—add protection at the gateway
Run detection in your own environment
Attach guardrails to a gateway provider and start anonymizing requests immediately.