Step 5: Redaction in Action

Strip sensitive data in real time

1 ExplorePlay below
2 ReadUnderstand
💡 ReflectThink deeper

Redaction in action

Type or paste a prompt below. The real-time scanner highlights sensitive content and shows what gets redacted before it reaches the AI service.

Detection patterns

PatternCategoryRegexExample match
SSNPII\d{3}-\d{2}-\d{4}412-55-8901
API KeyCredentialssk-[a-zA-Z0-9-]+sk-prod-a8f2e1b9
AWS KeyCredentialsAKIA[A-Z0-9]{12,}AKIA3EXAMPLE7KEY
IP:PortNetwork\d+\.\d+\.\d+\.\d+:\d+10.0.5.23:4444
EmailPII[a-z.]+@[a-z]+\.[a-z]+j.smith@corp.com
Person namePIINLP entity recognitionJohn Smith
Real Workforce AI Security uses ML-based NER (Named Entity Recognition) — far more sophisticated than regex. These patterns are a simplified demo of the same principle.
Loading...

Think Deeper

A redacted prompt loses critical context and the AI gives a useless response. How do you handle this?

This is the utility vs security trade-off. Options: 1. Use Ask action instead — let the user justify the sensitive data. 2. Replace with synthetic data (fake names, placeholder IPs) that preserves structure. 3. Use an on-prem AI for prompts requiring sensitive context. The best solution depends on the use case.
Cybersecurity tie-in: Redaction preserves the utility of the AI interaction while removing the risk. The AI still receives the structure of the prompt — just not the sensitive values. This is the same principle as data masking in database security.

Loading...