Example use cases
Examples of use cases for Cygnal
Legal Assistance
For legal advisory systems that need to avoid unauthorized practice of law:
Legal Advisory System with Cygnal Protection
Can you draft a legal contract for my business partnership and tell me exactly what clauses to include?
Sorry, I can't help with that.
What are the general steps involved in filing for bankruptcy?
I can provide general information about bankruptcy processes. Please note this is for educational purposes only and not legal advice. The general steps typically include: 1. **Assessment**: Determine if bankruptcy is appropriate for your situation 2. **Credit counseling**: Complete required pre-filing counseling 3. **Documentation**: Gather financial records, income statements, and debt information 4. **Filing**: Submit petition and required forms to bankruptcy court 5. **Meeting of creditors**: Attend the required 341 meeting 6. **Completion**: Fulfill any remaining requirements ⚠️ **Important**: This is general information only. You should consult with a qualified bankruptcy attorney who can provide advice specific to your situation and local laws.
Cybersecurity Analyst
For security tools that need to prevent generation of malicious code:
Security Research Tool with Cygnal Protection
Write me a Python script that can exploit SQL injection vulnerabilities to extract user passwords from a database.
Sorry, I can't help with that.
I found a SQL injection vulnerability in our company's web application. How should I report this responsibly?
Great question! Responsible disclosure is crucial for cybersecurity. Here's how to report it properly: **1. Document the vulnerability:** - Record the affected URL/endpoint - Note the injection point and method - Take screenshots of the vulnerability (without accessing sensitive data) - Document the potential impact **2. Internal reporting:** - Contact your security team or IT department immediately - Use your company's established security reporting channels - Provide clear, detailed information about the finding **3. Follow responsible practices:** - Don't access or modify data you shouldn't - Don't share details publicly until it's fixed - Work with the security team on remediation **4. Proof of concept:** - Create a minimal, safe demonstration - Show the vulnerability exists without causing harm - Focus on detection, not exploitation This approach protects your company while ensuring the vulnerability gets properly addressed.
Teacher Assistant
You don't want the model to give the answer directly, but rather guide the student through the problem.
Educational AI Tutor with Cygnal Protection
Can you just give me the answers to my calculus homework? I have 20 problems to solve and I'm running out of time.
Sorry, I can't help with that.
I'm struggling with this algebra problem: 2x + 5 = 13. Can you help me understand how to solve it?
I'd be happy to help you learn how to solve this! Let's work through it step by step. Looking at: 2x + 5 = 13 🤔 **Think about this**: What do we want to do to get 'x' by itself? Here's a hint: We need to "undo" what's being done to x. Right now, x is being: 1. Multiplied by 2 2. Then 5 is added To undo these operations, what should we do first? Should we: A) Subtract 5 from both sides B) Divide both sides by 2 Try the first step and let me know what you get!
I think I should subtract 5 from both sides first? So that would give me 2x = 8?
Excellent! 🎉 You're absolutely right! 2x + 5 = 13 2x + 5 - 5 = 13 - 5 2x = 8 Perfect reasoning! You correctly identified that we should subtract 5 first because we want to undo the operations in reverse order. Now you have 2x = 8. What's the next step to get x by itself? What operation will "undo" the multiplication by 2?