$5 free credits when you sign up
Guardrails

Every request. Protected by default.

Five guardrails fire on every NemoRouter request from day one. PII redaction, prompt-injection detection, secret scanning, abuse blocking, response scanning — sub-50ms overhead, free on every tier, configurable per org/team/key.

guardrails · live event

Pre-call scan trigger

Provider modelgemini-2.5-flash
PII detectedSSN, email
Actionredact
API-key scanclean
Injection score0.04
Pre-call latency38 ms
Verdictallow + redact
PresidioInjection v3Secret scanAbuseResponse scan
Guardrails on every plan
5

PII, injection, secrets, abuse, response

Pre-call overhead
< 50 ms

Runs in parallel with request prep

Plan tiers gating it
0

Active on every tier from day one

Configurable scopes
3

Org > Team > Key with override

Capabilities

Six guardrails, all on by default

The five built-ins ship configured for every new org — plus a custom webhook layer for domain-specific rules. Toggle any off, override per-request, or layer them in any combination.

PII redaction (Microsoft Presidio)

Names, emails, phone numbers, SSNs, credit cards, addresses — detected and replaced with safe placeholders before the prompt ever reaches the model.

  • SSN, credit card, email, phone, address detectors
  • Custom recognizer support for org-specific PII patterns
  • Replacement tokens preserved across the conversation
  • Pre-call: the model never sees the raw value

Prompt-injection detection

Heuristic detection across six attack categories — instruction override, role switching, prompt extraction, delimiter injection, encoding tricks, DAN-style jailbreaks.

  • Trained on adversarial corpora; updated as new patterns surface
  • Pre-call block: 403 returned before the LLM is invoked
  • Per-key override for trusted research workloads
  • Logged with attack class for SIEM ingestion

Secret + API-key scanning

Scans every prompt for OpenAI, Anthropic, AWS, GitHub, and generic credential patterns. Redacts them before the LLM sees the message — your users’ secrets never leave your perimeter.

  • OpenAI sk-*, Anthropic sk-ant-*, AWS AKIA*, Bearer tokens
  • GitHub PATs, Slack tokens, JWT, Stripe keys
  • Generic high-entropy detector for unknown formats
  • Optional block-vs-redact mode per scope

Abuse + harmful-content blocking

Blocks violence, weapons, drug synthesis, CSAM, and self-harm keywords with leet-speak normalization. Pre-call by default, post-call for response sweeps.

  • Leet-speak + Unicode-confusable normalization
  • Curated keyword lists with quarterly refresh
  • Pluggable third-party providers (Azure, Bedrock, Lakera coming)
  • 403 guardrail_blocked with category breakdown

Response scanning

Post-call scan of model output before delivery. Sexual content, jailbreak echoes, leaked system prompts, and PII in completions are caught after the LLM responds but before the client receives it.

  • Streaming: response buffered, scanned, then delivered
  • Blocked output: 403 returned, completion withheld
  • Configurable: scan-and-redact vs scan-and-block
  • Cost note: post-call blocks were billed for the LLM call

Custom webhook guardrails

Plug your own classifier into the request path. Send the prompt to any HTTPS endpoint, await a verdict, then allow / block / redact based on the response. Latency-budgeted, fail-open or fail-closed.

  • Inline policy enforcement for domain-specific rules
  • Configurable timeout (default 500ms) and fail mode
  • Signed payloads — verify it was your guardrail talking
  • Mix with built-ins: webhook layered on top of Presidio + injection
Scope Hierarchy

Org > Team > Key with explicit override semantics

Guardrails are assigned at any of three scopes. Lower scopes inherit higher-scope guardrails by default, and can override them only if the parent permits. The result: a security policy you can trust to hold across thousands of keys.

Inheritance

The same UUID flows through every scope decision

organization_id is the same value in your Bearer key, in the Frontend session, and in every guardrail assignment row. There is no mapping table to drift, no sync layer to compromise — just a clean inheritance chain that resolves at request time.

  • Org-level: applies to every key in the organization
  • Team-level: applies to keys assigned to a team
  • Key-level: overrides org and team, if the org permits
  • Skip-inherited mode for research / red-team workloads
  • Resolution cached 30s in Nemo Backend; revoke is immediate
scope resolution · sk-nemo-...x4kf

Effective guardrail set

Org policy5 inherited
Team policy+ webhook (legal)
Key policyskip injection
Override allowed?yes (org permits)
Effective at request5 active
orgteam:legalkey:research-01
Request Pipeline

Inline in the proxy path — not a sidecar

In path

Guardrails are not an extra API call

Every guardrail runs inside the Nemo Backend request path — between auth and the in-process Nemo Intelligent Proxy Router hop. No sidecar to scale, no extra HTTP call to your code, no SDK changes for your team. Pre-call rules fire before the model; post-call rules buffer the response.

  • Pre-call: PII redact, secret redact, injection block, abuse block
  • Post-call: response scan + redact-or-block of completions
  • Streaming: chunks buffered, scanned, then forwarded
  • Blocked requests do not consume credits (pre-call only)
  • Latency budget: < 50 ms pre-call, ~few ms post-call
pipeline · last 60s

Live guardrail traffic

Requests scanned12 408
PII redacted847
Secrets redacted23
Injection blocked4
Abuse blocked (pre)2
Response blocked (post)1
Median pre-call latency38 ms
pre-callpost-callstreamingno SDK changes
Use Cases

Built for teams that ship to production

Healthcare

Redact patient SSNs and medical-record numbers before they reach the model. Block responses that could constitute medical advice via post-call scanning.

Finance

Prevent credit-card numbers from reaching LLMs. Block unqualified financial advice in output. Custom webhook for domain-specific compliance rules.

Enterprise

Stop employees from pasting API keys into prompts. Block prompt-injection targeting internal tools. Per-team override for the security research team.

Consumer SaaS

Protect end users from harmful LLM output via post-call scanning. Custom webhook callbacks for product-specific content policies.

Providers

Built-ins today, more on the way

Mix Microsoft Presidio for PII, regex + keyword filters for policy, and custom webhooks for your business logic — all from the same dashboard. Third-party providers ship next.

Microsoft Presidio
PII redaction
Regex Patterns
Built-in
Keyword Filter
Built-in
Prompt Injection v3
Built-in
Custom Webhook
Yours
Azure Content SafetySoon
Microsoft
Bedrock GuardrailsSoon
AWS
Lakera GuardSoon
Lakera
AporiaSoon
Aporia
FAQ

Common guardrail questions

20+ models · 5 guardrails · 0 setup

Ship safer LLM features without writing safety code

Sign up, pick a tier, drop in your virtual key. Guardrails fire on the very first request — no flags to flip, no contracts to sign.