Documentation · v1

The docs page that actually shows you what we do.

Three surfaces. One redaction engine. Six ways to wire your rules. And a dashboard that — politely — turns AI from a leaky tap into a team-wide skill.

Read time: about 8 minutes. Skip-the-diagrams time: 3. Show this to your CISO time: 30 seconds.

🇫🇷 Paris · eu-west-3 🇩🇪 Frankfurt · eu-central DORA · NIS2 · GDPR
01 — For Developers

The VS Code extension. Security that disappears.

Most security tools punish you for working. You write a prompt with an API key in it, the tool blocks you, you context-switch, you lose the thought. SecureAIFlow does the opposite — it lets you keep typing the way you already do, intercepts the dangerous bits before they leave your IDE, and quietly puts your real values back into the answer.

You never see [REDACTED_1] in your editor. The LLM never sees your secret. Both halves of that sentence matter.

Your machine · VS Code LLM provider · EU region 1 · You write apiKey = "sk-proj-…" 2 · SAF redacts sk-… → [REDACTED_1] 3 · LLM receives [REDACTED_1] 4 · LLM replies use [REDACTED_1] … 5 · SAF un-redacts [REDACTED_1] → sk-… 6 · You read use sk-proj-… ✓ loop
Figure 1 The invisible reverse. Six steps, ~500 ms, no friction on the developer's side. The pseudonym map lives in-memory and dies with the request.
Why we built it this way

Because nobody's going to stop and fix a prompt at 11pm.

Early versions of SAF showed the redaction in the IDE. Devs hated it. They'd see [REDACTED_1] in a code example from the model, paste it into a file, run it — and break things. They started turning the extension off.

So we reversed the model. The IDE sees clean, runnable code. The audit log sees every redaction. The LLM sees nothing it shouldn't. Three different views of the same prompt, each tailored to what the viewer actually needs.

💬

Chat panel

Multi-turn conversations with model selection — Claude Sonnet, GPT-5, Gemini Flash. History persisted per workspace; fully redacted in transit.

✏️

Refactor, explain, fix

Select code, right-click, ask. Inline diffs with native VS Code Accept / Reject CodeLens — no custom UI to learn.

Smart routing

Fast tier (Gemini Flash Lite, Haiku) for short prompts. Power tier (Sonnet, GPT-5) for the gnarly stuff. Waterfall fallback when a provider has a bad day.

🔑

BYOK or Managed

Bring your own keys and we stay out of the billing relationship. Or use ours and get one bill, smart routing, and cost caps you can actually enforce.

📚

RAG, the boring way

Native Markdown ingestion. Chunk API for everything else. Ground answers in your own docs — without uploading them to a public model.

🔐

OIDC, then quiet

OpenID Connect for team auth. Policies inherited from the central dashboard. The dev configures nothing. The DSI is happy. Everyone wins.

02 — For Everyone

Three surfaces. One engine.

Your devs live in their IDE. Your analysts live in a browser tab. Your marketing lead just wants a chat that doesn't ask her to install anything. They're all using AI. They all need protection. They do not all need the same UX.

🌐 Chrome Plugin UX · visible redaction ChatGPT today · others soon 💼 Web Platform UX · unified chat anyone · zero install ⌨️ VS Code Ext UX · invisible reverse developers SAF Detection Engine Fine-tuned · proprietary F1 = 0.976 · in-memory only EU infrastructure 🇫🇷 Paris (eu-west-3) 🇩🇪 Frankfurt (eu-central) No CLOUD Act exposure · GDPR Art. 44 enforced
Figure 2 Same engine, same hosting, three deliberately different UX modes. Pick the surface that matches the person — not the other way around.
Chrome Plugin
chat.openai.com

For people already living inside ChatGPT all day. We don't ask them to switch tools. We ride along — invisible until a secret tries to leave.

UX · Visible Redaction
You see the swap happen. Right there in the prompt box, before send. It's slightly satisfying.
  • Intercepts in-page, pre-send
  • Highlights what got redacted
  • ChatGPT today · Claude & Gemini soon
  • Beta now · public Web Store within weeks
Web Platform
platform.secureaiflow.com

For everyone else. The PM doing strategy work. The analyst summarizing a deck. The HR lead writing a job spec. Open the URL, start chatting.

UX · Unified Chat
One window. Switch models per message. Upload your Markdown. Redaction handled inline.
  • Zero install — works on any device
  • Claude · GPT · Gemini in one place
  • Bring your own knowledge base
  • Shared team workspaces
VS Code Extension
marketplace.visualstudio.com

For developers who already have an AI workflow and don't want a new one. Install from the Marketplace; coexists peacefully with Copilot and Cursor.

UX · Invisible Reverse
Redaction is silent. The reply you read has your real values back in it. Copy. Paste. Run. Done.
  • Chat, refactor, explain, fix
  • Native Accept / Reject CodeLens
  • BYOK or Managed routing
  • Pseudonyms reversed in-memory

Same redaction. Opposite UX. On purpose.

A senior backend dev and a customer support agent need different things from the same security layer. We stopped pretending otherwise.

Chrome — visible

User types
My DB password is P@ssw0rd!2026
User sees, before send
My DB password is [REDACTED_1]
LLM receives
My DB password is [REDACTED_1]
Goal: trust by sight. Non-technical users see the protection happen. And the pseudonym sticks around in the answer too — they can safely paste the AI's reply into a Jira ticket, a Slack thread, a customer email.

VS Code — invisible

Developer writes
apiKey = "sk-proj-a8X9…"
LLM receives
apiKey = "[REDACTED_1]"
Developer reads
apiKey = "sk-proj-a8X9…"
Goal: zero friction. The reply is paste-ready. The redaction is logged for audit, never shown in the editor. The dev stays in flow; the CISO gets the trail. Both happy.
Your security team already has a system of record. We plug into yours. You don't migrate; you connect.
03 — Configuration

Two kinds of sensitive data. Six places to keep the rules.

SecureAIFlow catches two things: secrets (API keys, passwords, tokens, the stuff in your .env file) and PII (the customer data sitting in your database — emails, IBANs, internal IDs). They live in different places at your company, so we read them from different places too.

Banks already have HashiCorp Vault for secrets. Fintechs already have Postgres or Mongo for customer schemas. We didn't want to become one more database your security team has to migrate to — so we connect to wherever you already keep the truth.

Secrets · what leaks
API keys, passwords, JWT tokens, SSH keys, connection strings. Lives in Vault, .yaml files, or matched by regex.
PII · what identifies
Emails, IBANs, customer IDs, full names, addresses. Lives in your Postgres or MongoDB schemas — we look up your sensitive columns, never copy the data.
PII sources SQL PostgreSQL 17+ NOSQL MongoDB 8.3+ Secrets sources VAULT HashiCorp Vault TEXT .yaml · .txt files API REST management Either category REGEX custom patterns Rule Merger Detection pipeline · 3 stages Stage 1 Regex fast filter Stage 2 AI model fine-tuned Stage 3 HMAC-SHA256 pseudonymize Redacted prompt → LLM F1 = 0.976 · ≤ 500 ms
Figure 3 Sources grouped by what they catch. PII comes from your databases. Secrets come from your vault and config files. Regex bridges both — for the org-specific patterns nobody else has.
SQL · PII

PostgreSQL 17+

Point SAF at your customer schema. Tell it which columns are sensitive — email, iban, phone, that custom customer_ref. SAF looks up patterns at runtime — your data never moves.

If your customer data already lives in Postgres (it probably does).
NOSQL · PII

MongoDB 8.3+

Same idea, document-shaped. Flag the fields that hold PII in your collections; SAF reads the schema and detects matches in prompts. Change streams mean rule updates propagate in seconds, not minutes.

If you're a fintech or SaaS storing user data in Mongo.
VAULT · SECRETS

HashiCorp Vault

The gold standard. Every API key, password, and token your platform team has already onboarded into Vault is automatically protected — SAF reads the secret signatures, never the values. 100% precision on anything Vault manages.

If you're a bank, an insurer, or anyone audited by ACPR or BaFin.
TEXT · SECRETS

Plain .yaml / .txt

Drop a file in the config directory, commit it, you're done. GitOps for security policy — versioned, reviewed, rolled back the same way you handle Terraform. Honest workflow for small teams.

If "another database" sounds like one project too many this quarter.
REGEX · EITHER

Custom Regex

Some patterns nobody hard-codes for you. Email is the classic — here's the one we ship as a starter:

# email
[\w.+-]+@[\w-]+\.[\w.-]+

# French IBAN
FR\d{2}(\s?\d{4}){5}\s?\d{3}

Add your own for internal IDs, SKUs, or that weird prod token format only you have.

API · MANAGEMENT

Management API

REST endpoints for rules, integrations, audit logs, dashboard exports. Wire SAF into your SIEM, your CI/CD, or the internal admin tool nobody else maintains.

If SAF is one node in a bigger compliance pipeline.

Honestly, six sources is a lot. We know. We left them all in because every customer we shipped to wanted a different one — and migrating between rule stores is the kind of project that quietly kills security upgrades.

04 — For Team Leads

The dashboard. Two audiences, one screen.

The CISO needs an audit trail. The engineering manager needs to know who on the team is actually shipping faster because of AI — and who's quietly stuck. Same data. Two different questions. Same screen.

1 · TRACK prompts redactions 2 · SPOT top performer by patterns 3 · EXTRACT their prompt templates 4 · SHARE with the rest of the team 5 · LIFT median rises team accelerates re-measure next month
Figure 4 The team acceleration loop. AI productivity is a learnable skill — the dashboard is the part that makes the skill teachable.

From "what got blocked" to "what's working"

Most security dashboards stop where ours starts. Yes, you'll see secrets caught, tokens scanned, cost per provider, redactions per surface — all the standard audit fare. Your DPO will be fine.

But scroll down. You'll find the team view: consumption per person, models used, prompts sent, redactions triggered, cost incurred. Sort by activity and the people pulling the most leverage out of AI rise to the top. They're your top performers. Not because they're "10× developers" — because they figured out a few patterns the others haven't found yet.

The trick: AI productivity is teachable. Find the prompts that work. Share them. Watch the median rise. The dashboard isn't surveillance — it's a tool for the manager who actually wants the team to get better.

You also get cost-per-team, cost-per-project (use tags), DORA Article 28 audit exports, and the full prompt history — redacted, naturally — for any compliance investigation.

Team features require BYOK, Managed, or On-Premises. Free is intentionally solo — a single dev exploring AI safely. The moment you want to coach a team, you'll want BYOK at minimum (€16/seat/mo, min 5 seats).
Team · Engineering
Last 30 days
2,847
Prompts
↑ 34%
412
Secrets caught
↑ 12%
€187
LLM cost
↓ 8%
Top Performers
LM
Léa M. ★ Top
Senior Backend · Paris
847 prompts · 18 patterns
JB
Jonas B.
Frontend Lead · Frankfurt
612 prompts · 11 patterns
PD
Pierre D.
DevOps · Lyon
498 prompts · 9 patterns
HW
Hannah W.
Junior Backend · Berlin
112 prompts · 2 patterns
💡 Insight: Léa's "test scaffolding" prompt template was reused 47× this month. Promote it to the team library?

Stop reading. Start protecting.

Free for individuals. Fair for teams. Hosted in Paris or Frankfurt — never anywhere else. Your DPO will thank you. Your devs will not notice we're there. Which is exactly the point.

Install VS Code Extension Open Web Platform Book a Team Demo