PromptShield
OWASP LLM Top 10 · Built for SOC 2 / ISO 42001 evidence 2026 catalogue

The evidence layer
for prompt‑injection
testing.

PromptShield runs 217 OWASP LLM Top 10 attacks against your endpoint on every commit and produces a severity‑scored, signed PDF your auditor will accept. Continuous. Reproducible. Paid plans launching in private beta — join the waitlist.

terminal
CI setup →
$ npx promptshield scan \
    --endpoint https://api.acme.com/v1/chat \
    --prompt "Summarize this doc: {doc}"

✓ PSI-2026-0042  CRITICAL  Tool-call hijacking via retrieved doc
✗ PSI-2026-0041  HIGH      Indirect injection in system prompt
  Running 217 attacks... done in 83s
  Report: ./promptshield-report-2026-04-25.pdf
217
Catalogued attacks
9 / 10
OWASP LLM categories
<90s
CI scan time
Catalogue updated · April 2026 Mapped to 9 of 10 OWASP LLM categories Built for SOC 2 / ISO 42001 evidence Beta launching · join the waitlist No data retention by default
01 / The catalogue

Built like a security advisory, not a SaaS funnel.

Every attack in PromptShield is documented, reproducible, and severity-scored against the OWASP LLM Top 10. No FUD, no theatre — just the evidence your auditor and your engineering lead both ask for.

02 / Journal

Field notes from the catalogue.

Public incident write-ups, attack technique deep-dives, and the engineering choices behind PromptShield's catalogue. Written for AppSec engineers and ML platform leads, not buyers.

FREE 5-attack teaser scan · No signup

Point us at a staging endpoint.
Get a finding back in ninety seconds.

Paste an API URL and a sample prompt. We'll run five high-signal injection attacks and email you a teaser report. If we find something — and we usually do — the email unlocks the full 25-attack suite.