Overview
Pipeline flowchart
Secludy PII Injection & Detection Tool, injects realistic PII into training data to stress-test LLMs and detects leakage in real-time, ensuring privacy compliance and robust data security.
The PII Leakage Detection solution provides enterprise-grade monitoring and analysis of machine learning model outputs to identify potential exposure of sensitive personal information. Using the highly efficient Aho-Corasick pattern matching algorithm, this tool systematically scans model responses for over 50 categories of Personally Identifiable Information (PII), including names, addresses, social security numbers, credit card information, and other sensitive data points. The solution delivers comprehensive reporting through multiple formats. JSON output files provide detailed technical analysis of detected leakages, including exact matches, context, and statistical breakdowns by PII category. The automated PDF report generation feature creates executive-friendly summaries with visualizations and risk assessments, making it easy to share findings with stakeholders and compliance teams. All results are organized in a clear directory structure for easy access and archival. Perfect for ML engineers, data scientists, and privacy officers, this tool integrates seamlessly into existing ML pipelines and testing workflows. Whether you're conducting pre-deployment safety validations, performing routine privacy audits, or responding to compliance requirements, this solution provides the robust PII detection capabilities needed to maintain data privacy standards and protect sensitive information in machine learning, Large Language Model (LLM) applications. We also included a Github repo for quick start instruction and test data https://github.com/Secludy/PII-inject-detect-tool
Highlights
- Enterprise-Ready Integration: Seamlessly fits into existing ML workflows with minimal setup, enabling immediate privacy monitoring capabilities for model validation and compliance requirements.
- Automated Reporting Suite: Generates both detailed JSON technical reports and executive-friendly PDF summaries with visualizations, making privacy compliance documentation straightforward and actionable.
- Advanced Canary-Based Detection: Utilizes strategically embedded canary sequences with synthetic PII data to accurately track and identify potential information leaks in ML model outputs, providing a robust privacy monitoring system.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
- $299.00/month
Vendor refund policy
Full refund within 2 weeks
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
pull docker image
- Amazon ECS
- Amazon EKS
- Amazon ECS Anywhere
- Amazon EKS Anywhere
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
added test sample file in the github repo https://github.com/Secludy/PII-inject-detect-tool
Additional details
Usage instructions
please see details to the documentation link https://github.com/Secludy/PII-inject-detect-tool
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products

