Features Overview

Comprehensive overview of Gray Swan's AI security and evaluation platform

Why Choose Gray Swan?

Gray Swan provides enterprise-grade AI security solutions that protect your LLM deployments from threats while ensuring reliable, compliant AI interactions. Our platform offers two core products designed to secure AI systems at every stage of development and deployment.

Cygnal: Real-time AI Protection

Cygnal is your first line of defense against AI threats, providing real-time security filtering that wraps around any LLM deployment with just a few lines of code.

Key Capabilities:

Universal Compatibility

Works with OpenAI, Anthropic, Google Gemini, and any OpenAI-compatible LLM provider

Real-time Filtering

Input/output content moderation with customizable policies

Drop-in Integration

Change only your base URL - no SDK changes required

Threat Detection

Advanced jailbreak detection and prompt injection prevention

Perfect for:

  • Production LLM applications requiring content safety
  • Customer-facing AI products
  • Enterprises with compliance requirements
  • Applications handling sensitive data

Shade: AI Vulnerability Assessment

Shade is an advanced AI security evaluation suite that continuously probes and analyzes your LLMs to identify potential vulnerabilities before they become problems.

Key Capabilities:

Automated Probing

Continuous stress-testing of your AI deployment

Vulnerability Detection

Identifies scenarios leading to harmful content, data leaks, or off-script behavior

Evolving Protection

Updates automatically as new AI threats emerge

Comprehensive Reporting

Detailed analysis with reproducible outcomes

Perfect for:

  • Enterprise AI security teams
  • AI developers building secure systems
  • Research teams studying AI safety
  • Organizations requiring AI risk assessments

Getting Started Paths

For Developers

  1. Quickstart - Get protected completions running in 5 minutes
  2. Creating Completions - Detailed integration guide
  3. Example Use Cases - Real-world implementation patterns

For Security Teams

  1. Monitor Requests - Content analysis and policy violation detection
  2. Configuring Shade - Advanced vulnerability assessment
  3. API Reference - Complete technical documentation

For DevOps/Platform Teams

  1. Integrations - Platform-specific integration guides
  2. Monitor Requests - Operational monitoring and alerting
  3. API Reference - Deployment and configuration details