Developers
Stop pasting stack traces with API keys, database URIs, and internal IPs into ChatGPT. Sentinel catches credentials even when they're embedded in code.
Core Sentinel monitors your clipboard in real-time, detects PII before it reaches any LLM, and gives you one-click remediation — redact, rephrase, or encrypt.
Stop pasting stack traces with API keys, database URIs, and internal IPs into ChatGPT. Sentinel catches credentials even when they're embedded in code.
Patient names, DOBs, diagnoses, and medication lists get flagged before they reach any AI. Maintain HIPAA compliance effortlessly.
Account numbers, transaction details, SSNs in financial documents — Sentinel blocks them from reaching uncontrolled AI endpoints.
Contracts with party names, case numbers, privileged communications — keep attorney-client privilege intact when using AI assistants.
Explore warn/block behavior, remediation actions, drag behavior, file-scan simulation, and guided overlay tour — no installation required.
Whether you're a developer sharing code snippets, an HR professional discussing candidates, or a doctor describing symptoms — your clipboard carries secrets. Core Sentinel catches them before they leave your machine.
This is the exact runtime path from keyboard paste event to safety decision and model learning. It is intentionally deep, reproducible, and auditable.
Sentinel runs as a PyQt6 tray process and intercepts paste events only when active window matches supported LLM targets. This prevents unnecessary scanning and limits latency overhead.
Large clipboard content is normalized, then chunked into overlapping windows for robust inference on long inputs while preserving semantic context around entities.
Critical token families are matched first with deterministic regex. This catches exact leak signatures with near-zero recall loss on known formats.
| Pattern family | Examples | Runtime action |
|---|---|---|
| SSN / National ID | 123-45-6789 | High-risk candidate |
| Credit card / PAN | 4111 1111 1111 1111 | High-risk candidate |
| Email / Phone | john@corp.com, +1-202-555-0110 | Medium-risk candidate |
| Secrets / tokens | sk_live_..., JWT, API key | Force block candidate |
NER provides contextual entities beyond strict formatting, including PERSON / ORG / GPE / DATE / MONEY. This catches natural-language leakage that regex misses.
Windows are passed through a TinyBERT sequence classifier to estimate contextual breach probability (e.g., medical narratives, legal clauses, financial records).
Signals from regex, NER, and model probabilities are merged into a final 0-100 score and mapped to policy outcomes:
Users can safely continue work with guided transformations: Redact (mask tokens), Rephrase (PII-safe rewrite), Encrypt (AES-256 reversible protection), or Override with audit trace.
User corrections (false positives/negatives) are stored as supervised signals, then queued into periodic retraining runs. This keeps policy aligned with real operational usage without requiring raw user data collection.
Core Sentinel training follows a reproducible ML protocol: synthetic corpus design, adversarial augmentation, controlled optimization, and strict holdout evaluation for deployment confidence.
Every detection rule, every model weight, every line of code — auditable. No telemetry collected without consent. Your clipboard data never leaves your machine unless YOU choose Supabase sync.