Security Sanitizer
The Co-mind.ai Security Sanitizer provides configurable content safety policies that protect against prompt injection, jailbreak attempts, and PII leakage. It sits inline with all AI requests and can be configured per-tenant.Sanitizer admin endpoints require Admin role and the
sanitizer:read / sanitizer:write scopes for PAT access.Endpoints
| Endpoint | Method | Purpose |
|---|---|---|
/v1/admin/sanitizer/health | GET | Sanitizer service health check |
/v1/admin/sanitizer/policies | GET | Get current security policies |
/v1/admin/sanitizer/policies | POST | Update security policies |
/v1/admin/sanitizer/test | POST | Test sanitizer with sample text |
Check Sanitizer Health
Get Current Policies
Retrieve the active security policy configuration:Update Policies
Configure which safety checks are enabled and their sensitivity levels:Test the Sanitizer
Test how the sanitizer processes specific text without affecting production traffic:Policy Types
Injection Detection
Injection Detection
Detects attempts to manipulate the AI through prompt injection — inputs that try to override system instructions or extract internal information.Sensitivity levels:
low, medium, highJailbreak Detection
Jailbreak Detection
Identifies jailbreak attempts — inputs designed to bypass the model’s safety guidelines and content policies.Sensitivity levels:
low, medium, highPII Redaction
PII Redaction
Automatically detects and redacts personally identifiable information from inputs and outputs.Supported types: email addresses, phone numbers, SSNs, credit card numbers, and more.

