Real-time AI threat monitoring. Protect your apps from prompt injection, leaks, and attacks in just a few lines of code.
Project description
SecureVector
Runtime Firewall for AI Agents & Bots
Block prompt injection, jailbreaks, and data leaks before they reach your AI.
Website · Docs · Demo · Getting Started · Use Cases · API · Discord
How It Works
SecureVector sits between your AI agent and the LLM provider, scanning every request and response for security threats. Runs entirely on your machine — nothing leaves your infrastructure.
pip install securevector-ai-monitor[app]
securevector-app --web
Or download: Windows · macOS · Linux
Open-source. 100% local. No API keys. No cloud. No data sharing.
Highlights
- ☑ 100% Local — No data transmitted externally. Complete privacy.
- ☑ Agents Protected — LangChain, LangGraph, CrewAI, n8n, OpenClaw, and any OpenAI-compatible app.
- ☑ Input Scanning — Block prompt injection, jailbreaks, and manipulation before they reach the LLM.
- ☑ Output Scanning — Detect credential leaks, PII exposure, and system prompt disclosure.
- ☑ 18+ Providers — OpenAI, Anthropic, Gemini, Ollama, Groq, Azure, and more.
- ☑ One Command —
securevector-app --weband follow the UI to start protecting.
Install
Runtime: Python 3.9+ (MCP requires 3.10+)
| Install | Use Case | Size |
|---|---|---|
pip install securevector-ai-monitor[app] |
Local app — dashboard, LLM proxy, self-hosted | ~60MB |
pip install securevector-ai-monitor |
Cloud SDK — lightweight, uses cloud API | ~6MB |
pip install securevector-ai-monitor[mcp] |
MCP server — Claude Desktop, Cursor | ~20MB |
# Local users (self-hosted, OpenClaw proxy)
pip install securevector-ai-monitor[app]
securevector-app
# Cloud users (API integration)
pip install securevector-ai-monitor
Binary installers: Windows · macOS · Linux · All Releases
Quick Start
Step 1: Start SecureVector app
securevector-app --web
Step 2: Go to Integrations in the UI, choose your agent framework and LLM provider, then click Start Proxy.
Step 3: Point your app to the proxy (shown in the UI).
That's it! Every request is scanned for prompt injection. Every response is scanned for data leaks.
Supported providers: openai anthropic gemini ollama groq openrouter deepseek mistral xai azure together fireworks perplexity cohere cerebras lmstudio litellm
Agent Integrations
| Agent/Framework | Integration |
|---|---|
| LangChain | LLM Proxy or SDK Callback |
| LangGraph | LLM Proxy or Security Node |
| CrewAI | LLM Proxy or SDK Callback |
| Ollama / Open WebUI | LLM Proxy — see Integrations in UI |
| OpenClaw / ClaudBot | LLM Proxy — see Integrations in UI |
| n8n | Community Node |
| Claude Desktop | MCP Server Guide |
| Any OpenAI-compatible app | LLM Proxy — set OPENAI_BASE_URL to proxy |
| Any HTTP Client | POST http://localhost:8741/analyze with {"text": "..."} |
What It Detects
| Input Threats (User → LLM) | Output Threats (LLM → User) |
|---|---|
| Prompt injection | Credential leakage (API keys, tokens) |
| Jailbreak attempts | System prompt exposure |
| Data exfiltration requests | PII disclosure (SSN, credit cards) |
| Social engineering | Jailbreak success indicators |
| SQL injection patterns | Encoded malicious content |
Full coverage: OWASP LLM Top 10
Screenshots
Dashboard — stats, risk distribution, recent threats |
Threat Analytics — blocked, redacted, logged |
Integrations — LangChain, Ollama, OpenClaw, and more |
LLM Proxy — provider configuration |
Documentation
- Installation Guide — Binary installers, pip, service setup
- Use Cases & Examples — LangChain, LangGraph, CrewAI, n8n, FastAPI
- MCP Server Guide — Claude Desktop, Cursor integration
- API Reference — REST API endpoints
- Security Policy — Vulnerability disclosure
Editions
| Open Source | Professional/Enterprise |
|---|---|
| Apache 2.0 license | Expert-curated rule library |
| Community detection rules | Multi-stage ML threat analysis |
| Custom YAML rules | Real-time cloud dashboard |
| 100% local, zero data sharing | Team collaboration |
| Desktop app + local API | Priority support & SLAs |
Try Free · Pricing · Enterprise
Contributing
git clone https://github.com/Secure-Vector/securevector-ai-threat-monitor.git
cd securevector-ai-threat-monitor
pip install -e ".[dev]"
pytest tests/ -v
Contributing Guidelines · Code of Conduct
License
Apache License 2.0 — see LICENSE.
SecureVector is a trademark of SecureVector. See NOTICE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file securevector_ai_monitor-2.0.0.tar.gz.
File metadata
- Download URL: securevector_ai_monitor-2.0.0.tar.gz
- Upload date:
- Size: 351.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f072ff6329302f7b428ac80b4972a3eba1b5ad814a5aefdf4d85886c343e20b3
|
|
| MD5 |
8a4661f620402fea9d60eb993cc20d0f
|
|
| BLAKE2b-256 |
59711fb4efe28032ec229f398acf0906b3e792978b4e851c33f730212b573f16
|
File details
Details for the file securevector_ai_monitor-2.0.0-py3-none-any.whl.
File metadata
- Download URL: securevector_ai_monitor-2.0.0-py3-none-any.whl
- Upload date:
- Size: 414.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
eea991db8bbfe638a9385967009c663e4de0b7a00e599136653a03dc8887d488
|
|
| MD5 |
900a37a7cf76683e2aef2b5faee5b17f
|
|
| BLAKE2b-256 |
62052cf9abab2859957634f0815ea7ff6a7e24fa14b1d37b0e8e93ff2a7191d0
|