Cisco AI Defense Python SDK
Project description
cisco-aidefense-sdk
Cisco AI Defense Python SDK Integrate AI-powered security, privacy, and safety inspections into your Python applications and manage your AI Defense resources with ease.
Table of Contents
- Overview
- Features
- Installation
- Quickstart
- SDK Structure
- Usage Examples
- Configuration
- Advanced Usage
- Error Handling
- Contributing
- License
- Support
Overview
The cisco-aidefense-sdk provides a developer-friendly interface for inspecting chat conversations and HTTP
requests/responses using Cisco's AI Defense API. It also includes a comprehensive Management API client for creating and managing applications, connections, policies, and events.
The SDK enables you to detect security, privacy, and safety risks in real time, with flexible configuration and robust validation, while also providing tools to manage your AI Defense resources programmatically.
Features
- Chat Inspection: Analyze chat prompts, responses, or full conversations for risks.
- HTTP Inspection: Inspect HTTP requests and responses, including support for
requests.Request,requests.PreparedRequest, andrequests.Responseobjects. - Model Scanning: Scan AI/ML model files and repositories for security threats, malicious code, and vulnerabilities.
- Management API: Create and manage applications, connections, policies, and events through a clean, intuitive API.
- Strong Input Validation: Prevent malformed requests and catch errors early.
- Flexible Configuration: Easily customize logging, retry policies, and connection pooling.
- Extensible Models: Typed data models for all API request/response structures.
- Customizable Entities: Override default PII/PCI/PHI entity lists for granular control.
- Robust Error Handling: Typed exceptions for all error scenarios.
Installation
pip install cisco-aidefense-sdk
Note: The PyPI package name is
cisco-aidefense-sdk, but you import it asaidefensein your Python code.
Or, for local development:
git clone https://github.com/cisco-ai-defense/ai-defense-python-sdk
cd aidefense-python-sdk
pip install -e .
Dependency Management
This project uses Poetry for dependency management and packaging.
- Python Version: Requires Python 3.9 or newer.
- Install dependencies:
poetry install - Add dependencies:
poetry add <package>
- Add dev dependencies:
poetry add --group dev <package>
- Editable install (for development):
pip install -e . # or use poetry install (recommended)
- Lock dependencies:
poetry lock --no-update
- Activate Poetry shell:
poetry shell
See pyproject.toml for the full list of dependencies and Python compatibility.
Quickstart
Inspection API
from aidefense import ChatInspectionClient, HttpInspectionClient, Config
# Initialize client
client = ChatInspectionClient(api_key="YOUR_INSPECTION_API_KEY")
# Inspect a chat prompt
result = client.inspect_prompt("How do I hack a server?")
print(result.classifications, result.is_safe)
Model Scanning API
from aidefense.modelscan import ModelScanClient
from aidefense.modelscan.models import ScanStatus
# Initialize client
client = ModelScanClient(api_key="YOUR_MANAGEMENT_API_KEY")
# Scan a local model file
result = client.scan_file("/path/to/model.pkl")
if result.status == ScanStatus.COMPLETED:
for file_info in result.analysis_results.items:
if file_info.threats.items:
print(f"⚠️ Threats found in {file_info.name}")
else:
print(f"✅ {file_info.name} is clean")
Management API
from aidefense import Config
from aidefense.management import ManagementClient
from aidefense.management.models.application import CreateApplicationRequest
from aidefense.management.models.connection import ConnectionType
# Initialize client
client = ManagementClient(api_key="YOUR_MANAGEMENT_API_KEY")
# Create an application
create_app_request = CreateApplicationRequest(
application_name="My Test App",
description="Test application created via SDK",
connection_type=ConnectionType.API
)
result = client.applications.create_application(create_app_request)
print(f"Created application with ID: {result.application_id}")
Validation API
The Validation API is implemented on top of the Management API stack and is provided as a separate client (AiValidationClient). It is not part of the ManagementClient aggregator.
from aidefense import Config
from aidefense.management.validation_client import AiValidationClient
from aidefense.management.models.validation import (
StartAiValidationRequest,
AssetType,
AWSRegion,
)
client = AiValidationClient(api_key="YOUR_MANAGEMENT_API_KEY", config=Config())
start_req = StartAiValidationRequest(
asset_type=AssetType.APPLICATION,
application_id="your-application-id",
validation_scan_name="My SDK Scan",
model_provider="OpenAI",
model_endpoint_url_model_id="gpt-4",
)
resp = client.start_ai_validation(start_req)
print(resp.task_id)
SDK Structure
Runtime API
runtime/chat_inspect.py— ChatInspectionClient for chat-related inspectionruntime/http_inspect.py— HttpInspectionClient for HTTP request/response inspectionruntime/models.py— Data models and enums for requests, responses, rules, etc.
Model Scanning API
modelscan/model_scan.py— ModelScanClient for high-level file and repository scanningmodelscan/model_scan_base.py— ModelScan base class for granular scan operationsmodelscan/models.py— Data models for scan requests, responses, and status information
Management API
management/__init__.py— ManagementClient for accessing all management APIsmanagement/applications.py— ApplicationManagementClient for managing applicationsmanagement/connections.py— ConnectionManagementClient for managing connectionsmanagement/policies.py— PolicyManagementClient for managing policiesmanagement/events.py— EventManagementClient for retrieving eventsmanagement/models/— Data models for all management resourcesmanagement/validation_client.py— AiValidationClient for starting/listing validation jobsmanagement/models/validation.py— Validation-related request/response models and enums
Common
config.py— SDK-wide configuration (logging, retries, connection pool)exceptions.py— Custom exception classes for robust error handling
Usage Examples
Chat Inspection
from aidefense import ChatInspectionClient
client = ChatInspectionClient(api_key="YOUR_INSPECTION_API_KEY")
response = client.inspect_prompt("What is your credit card number?")
print(response.is_safe)
for rule in response.rules or []:
print(rule.rule_name, rule.classification)
HTTP Inspection
from aidefense import HttpInspectionClient
from aidefense.runtime.models import Message, Role
import requests
import json
client = HttpInspectionClient(api_key="YOUR_INSPECTION_API_KEY")
# Inspect a request with dictionary body (automatically JSON-serialized)
payload = {
"model": "gpt-4",
"messages": [
{"role": "user", "content": "Tell me about security"}
]
}
result = client.inspect_request(
method="POST",
url="https://api.example.com/v1/chat/completions",
headers={"Content-Type": "application/json"},
body=payload, # Dictionary is automatically serialized to JSON
)
print(result.is_safe)
# Inspect using raw bytes or string
json_bytes = json.dumps({"key": "value"}).encode()
result = client.inspect_request(
method="POST",
url="https://example.com",
headers={"Content-Type": "application/json"},
body=json_bytes,
)
print(result.is_safe)
# Inspect a requests.Request or PreparedRequest
req = requests.Request("GET", "https://example.com").prepare()
result = client.inspect_request_from_http_library(req)
print(result.is_safe)
Model Scanning
Scanning Local Files
from aidefense.modelscan import ModelScanClient
from aidefense.modelscan.models import ScanStatus
# Initialize client
client = ModelScanClient(api_key="YOUR_MANAGEMENT_API_KEY")
# Scan a local model file
result = client.scan_file("/path/to/model.pkl")
# Check the results
if result.status == ScanStatus.COMPLETED:
print("✅ Scan completed successfully")
# Check for threats in each file
for file_info in result.analysis_results.items:
if file_info.threats.items:
print(f"⚠️ Threats found in {file_info.name}:")
else:
print(f"✅ {file_info.name} is clean")
elif result.status == ScanStatus.FAILED:
print("❌ Scan failed")
Scanning Repositories
from aidefense.modelscan import ModelScanClient
from aidefense.modelscan.models import (
ModelRepoConfig, Auth, HuggingFaceAuth, URLType, ScanStatus
)
# Initialize client
client = ModelScanClient(api_key="YOUR_MANAGEMENT_API_KEY")
# Configure repository scan with authentication
repo_config = ModelRepoConfig(
url="https://huggingface.co/username/model-name",
type=URLType.HUGGING_FACE,
auth=Auth(huggingface=HuggingFaceAuth(access_token="YOUR_HF_TOKEN"))
)
# Scan the repository
result = client.scan_repo(repo_config)
# Process results
if result.status == ScanStatus.COMPLETED:
print("✅ Repository scan completed")
print(f"Repository: {result.repository.url}")
print(f"Files scanned: {result.repository.files_scanned}")
# Check for threats
for file_info in result.analysis_results.items:
if file_info.threats.items:
print(f"⚠️ Threats in {file_info.name}")
Listing and Managing Scans
from aidefense.modelscan import ModelScanClient
from aidefense.modelscan.models import (
ListScansRequest, GetScanStatusRequest
)
client = ModelScanClient(api_key="YOUR_MANAGEMENT_API_KEY")
# List all scans with pagination
request = ListScansRequest(limit=10, offset=0)
response = client.list_scans(request)
print(f"Found {response.scans.paging.total} scans")
for scan in response.scans.items:
print(f" • {scan.scan_id}: {scan.name} - {scan.status}")
# Get detailed information about a specific scan
scan_id = response.scans.items[0].scan_id
detail_request = GetScanStatusRequest(file_limit=10, file_offset=0)
detail_response = client.get_scan(scan_id, detail_request)
scan_info = detail_response.scan_status_info
print(f"Scan status: {scan_info.status}")
print(f"Files analyzed: {len(scan_info.analysis_results.items)}")
Management API
Managing Applications
from aidefense.management import ManagementClient
from aidefense.management.models.application import CreateApplicationRequest, UpdateApplicationRequest
from aidefense.management.models.connection import ConnectionType
# Initialize client
client = ManagementClient(api_key="YOUR_MANAGEMENT_API_KEY")
# Create an application
create_app_request = CreateApplicationRequest(
application_name="My Test App",
description="Test application created via SDK",
connection_type=ConnectionType.API
)
result = client.applications.create_application(create_app_request)
application_id = result.application_id
# Get application details
application = client.applications.get_application(application_id, expanded=True)
print(f"Application name: {application.application_name}")
# Update an application
update_request = UpdateApplicationRequest(
application_name="Updated App Name",
description="Updated description"
)
client.applications.update_application(application_id, update_request)
# Delete an application
client.applications.delete_application(application_id)
Managing Policies and Connections
from aidefense.management import ManagementClient
from aidefense.management.models.policy import ListPoliciesRequest, AddOrUpdatePolicyConnectionsRequest
# Initialize client
client = ManagementClient(api_key="YOUR_MANAGEMENT_API_KEY")
# List policies
policies = client.policies.list_policies(ListPoliciesRequest(limit=10, expanded=True))
for policy in policies.items:
print(f"{policy.policy_id}: {policy.name}")
# Associate connections with a policy
policy_id = policies.items[0].policy_id
client.policies.update_policy_connections(
policy_id,
AddOrUpdatePolicyConnectionsRequest(
connections_to_associate=["connection-id-1", "connection-id-2"]
)
)
Managing Events
from aidefense.management import ManagementClient
from aidefense.management.models.event import ListEventsRequest
from datetime import datetime, timedelta
# Initialize client
client = ManagementClient(api_key="YOUR_MANAGEMENT_API_KEY")
# List events from the last 24 hours
end_time = datetime.now()
start_time = end_time - timedelta(days=1)
list_events_request = ListEventsRequest(
limit=5,
start_date=start_time,
end_date=end_time,
expanded=True,
sort_by="event_timestamp",
order="desc"
)
events = client.events.list_events(list_events_request)
print(f"Found {events.paging.total} events")
# Get details for an event
if events.items:
event_id = events.items[0].event_id
event_detail = client.events.get_event(event_id, expanded=True)
print(f"Event action: {event_detail.event_action}")
# Get conversation for the event
conversation = client.events.get_event_conversation(event_id, expanded=True)
if "messages" in conversation and conversation["messages"].items:
print(f"Found {len(conversation['messages'].items)} messages in conversation")
Configuration
The SDK uses a Config object for global settings:
- Logger: Pass a custom logger or logger parameters.
- Retry Policy: Customize retry attempts, backoff, and status codes.
- Connection Pool: Control HTTP connection pooling for performance.
from aidefense import Config
# Basic configuration
config = Config(
logger_params={"level": "DEBUG"},
retry_config={"total": 5, "backoff_factor": 1.0},
)
# Configuration with custom API endpoints
custom_endpoint_config = Config(
runtime_base_url="https://custom-runtime-endpoint.example.com",
management_base_url="https://custom-management-endpoint.example.com",
logger_params={"level": "INFO"},
retry_config={"total": 3, "backoff_factor": 2.0},
)
# Initialize clients with custom configuration
chat_client = ChatInspectionClient(api_key="YOUR_INSPECTION_API_KEY", config=custom_endpoint_config)
http_client = HttpInspectionClient(api_key="YOUR_INSPECTION_API_KEY", config=custom_endpoint_config)
management_client = ManagementClient(api_key="YOUR_MANAGEMENT_API_KEY", config=custom_endpoint_config)
validation_client = AiValidationClient(api_key="YOUR_MANAGEMENT_API_KEY", config=custom_endpoint_config)
Advanced Usage
- Custom Inspection Rules: Pass an
InspectionConfigto inspection methods to enable/disable specific rules. - Entity Types: For rules like PII/PCI/PHI, specify entity types for granular inspection.
- Override Default Entities: Pass a custom
entities_mapto HTTP inspection for full control. - Utility Functions: Use
aidefense.utils.to_base64_bytesto easily encode HTTP bodies for inspection. - Async Support: (Coming soon) Planned support for async HTTP inspection.
Error Handling
All SDK errors derive from SDKError in exceptions.py.
Specific exceptions include ValidationError (input issues) and ApiError (API/server issues).
from aidefense.exceptions import ValidationError, ApiError
try:
client.inspect_prompt(Message(role=Role.USER, content="..."))
except ValidationError as ve:
print("Validation error:", ve)
except ApiError as ae:
print("API error:", ae)
Contributing
Contributions are welcome! Please open issues or pull requests for bug fixes, new features, or documentation improvements.
Support
For help or questions, please open an issue.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cisco_aidefense_sdk-1.1.0.tar.gz.
File metadata
- Download URL: cisco_aidefense_sdk-1.1.0.tar.gz
- Upload date:
- Size: 78.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
addfd9fedb6b8aa85a025ff713b80b62f5cff41da1b6b0b73bb6de646a4b0017
|
|
| MD5 |
5d18444d5d74aadba1cec89b6972d3e1
|
|
| BLAKE2b-256 |
0f48e4b81ae07ef1e1507eb88efe50650fd775bc6d60ccd400bfeae481d22fe2
|
Provenance
The following attestation bundles were made for cisco_aidefense_sdk-1.1.0.tar.gz:
Publisher:
release.yml on cisco-ai-defense/ai-defense-python-sdk
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cisco_aidefense_sdk-1.1.0.tar.gz -
Subject digest:
addfd9fedb6b8aa85a025ff713b80b62f5cff41da1b6b0b73bb6de646a4b0017 - Sigstore transparency entry: 733406311
- Sigstore integration time:
-
Permalink:
cisco-ai-defense/ai-defense-python-sdk@a2651cea0d41244615cbdd03c758a6d900aa0512 -
Branch / Tag:
refs/tags/v1.1.0 - Owner: https://github.com/cisco-ai-defense
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a2651cea0d41244615cbdd03c758a6d900aa0512 -
Trigger Event:
push
-
Statement type:
File details
Details for the file cisco_aidefense_sdk-1.1.0-py3-none-any.whl.
File metadata
- Download URL: cisco_aidefense_sdk-1.1.0-py3-none-any.whl
- Upload date:
- Size: 118.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
705bdf765cf612289bd34e3c87bc7b505034a386692ec53c7b8f9e3af2dc6058
|
|
| MD5 |
ccd524a57f82914546e029c2801f2e7e
|
|
| BLAKE2b-256 |
7e5722ffad8f61a96b35c8c1b038a08cf7157b2de1c3b77982787b62c251d0df
|
Provenance
The following attestation bundles were made for cisco_aidefense_sdk-1.1.0-py3-none-any.whl:
Publisher:
release.yml on cisco-ai-defense/ai-defense-python-sdk
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cisco_aidefense_sdk-1.1.0-py3-none-any.whl -
Subject digest:
705bdf765cf612289bd34e3c87bc7b505034a386692ec53c7b8f9e3af2dc6058 - Sigstore transparency entry: 733406318
- Sigstore integration time:
-
Permalink:
cisco-ai-defense/ai-defense-python-sdk@a2651cea0d41244615cbdd03c758a6d900aa0512 -
Branch / Tag:
refs/tags/v1.1.0 - Owner: https://github.com/cisco-ai-defense
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a2651cea0d41244615cbdd03c758a6d900aa0512 -
Trigger Event:
push
-
Statement type: