Prompt Injection Defense is the inbound scrubber for everything the AI fleet reads. Log lines, alert payloads, ticket descriptions, customer messages, anything that gets concatenated into a prompt is scanned, scored, and quarantined if suspicious. The agents never see the malicious string.
The defense ships with 40+ detection signatures based on published prompt-injection corpora plus our own red-team work. Patterns include role-override strings, base64-encoded system prompts, unicode bidi-override tricks, code-block prompt smuggling, and "ignore previous instructions" variants. Signatures update weekly via the Nova security feed.
Inputs that match a high-confidence signature are blocked outright. Inputs that match a medium-confidence signature are routed to a sandbox: a separate, isolated agent instance with no production tools and no secret access. The sandbox processes the input safely so a false positive does not lose useful signal, the human reviewer can release real signals back to production.
The inbound defense has a sibling: Prompt Egress Scanner. Egress strips secrets, PII, and cross-tenant data from the prompt body before it leaves your network for the LLM provider. Together they make the prompt boundary watertight in both directions, which is what your security team will ask for first.
Defense produces a weekly SOC report: total inputs scanned, blocks, sandboxes, releases, false-positive rate (from operator releases), top signatures fired, and a 30-day trend. The data ships to your SIEM via syslog or webhook, so your existing security tooling sees the same picture.
Subscribe to Nova AI Ops on YouTube for demos, tutorials, and feature deep-dives.
Every input the agents read is data, not instructions. The defense layer enforces that boundary so a customer support ticket cannot exfiltrate a prod secret.