Novinka · AI ochrana, ktorá sa sama učí

Doba vibe codingu a agentov si žiadamúdrejší štít.

Vo svete, kde ktokoľvek spustí web za popoludnie — a boty, scrapovacie agenty a prompt-injection útoky škálujú cez noc — prvá vrstva obrany sa musí učiť rovnako rýchlo ako útočníci. Corpilus Shield je AI vrstva pred vašimi formulármi, LLM chatmi, MCP nástrojmi a dátovými zdrojmi, ktorá blokuje útok ešte pred tým, než sa dotkne vašej logiky.

Jeden JS widget3-riadkový backend SDKUčí sa per tenant€ cenou pre SMB
Bots
LLM
MCP
Web
Corpilus Shield
Hrozby roku 2026

Útočníci dostali AI. Vaše formuláre a chatboti nie.

Vibe-coded weby, no-code e-shopy a nedorobené LLM integrácie idú do produkcie rýchlejšie, než ich stíha auditovať akýkoľvek security tím. Na druhej strane útočníci škálujú Playwright-stealth, platia centy za vyriešený CAPTCHA a reťazia LLM-ky, kým nevylakajú z vášho promptu systémové inštrukcie alebo zákaznícke dáta.

Generické WAF-y vidia HTTP pakety. reCAPTCHA vidí token. Ani jedno nerozumie zámeru agenta, ktorý posiela váš support formulár, krade token alebo prompt-injektuje vašu vlastnú AI, aby vylakala zákaznícku databázu. Corpilus Shield to rozumie — a učí sa z každého pokusu, cez všetkých tenantov.

47 %
webovej traffic-u v 2026 nie je ľudská (boty, scrapery, AI agenty)
< 5 min
typický čas od spustenia vibe-coded webu po prvý bot probe
$0.001
cena útočníka za vyriešený CAPTCHA cez AI farmy
14 kat.
prompt-injection vzorov, ktoré Shield chytá out-of-the-box
Corpilus Shield

Samo-učiaca AI vrstva pred všetkým, čo spúšťate.

Vybudované ako rozšírenie Corpilus AI mozgu — ten istý engine, ktorý odpovedá vášmu tímu, teraz stráži aj vaše vstupné brány. Signály v reálnom čase, cross-tenant učenie, transparentný audit.

AI-native, nie regex box

Baseline z OWASP a 85 attack embeddings, doplnené AI analyzérom, ktorý každých 15 minút vytvára nové pravidlá na základe skutočných pokusov.

Jeden mozog, viac povrchov

Ten istý Shield chráni vaše formuláre, login stránky, LLM chaty, MCP nástroje, upload súborov aj SQL dátové zdroje. Jeden dashboard, jeden audit log.

Plug-and-play

Jeden <script> tag a 3 riadky backend middleware (Python, Node, PHP). Žiadny DNS re-point. Žiadna TLS terminácia. Koexistuje s vaším CDN, WAF a analytikou.

Dostupné pre SMB

Enterprise-grade obrana za SaaS ceny. Začnite zadarmo, škálujte s trafficom. Platíte za reálnu ochranu, nie za per-request mágiu.

Schopnosti

Čo Shield reálne robí.

Každá funkcia nižšie je živá, meraná v produkcii a zdokumentovaná v zákazníckom dashboarde. Všetky signály sa dajú ladiť per site.

33
Capabilities live
9
Shipped this sprint
8
Category groups
100%
Exercised in tests

Keystroke dynamics, mouse trajectory R², scroll patterns, touch events, form-fill timing, page-dwell — 28 real-time signals fed into the local scorer and backend scoring pipeline.

Protects against
Form-fill bots, headless automation, scripted submissions.

Canvas, WebGL, audio context, font detection, navigator fingerprinting fused into a SHA-256 device hash. Detects headless browsers and anti-detect tools.

Protects against
Puppeteer, Playwright, Selenium, PhantomJS, Camoufox, curl-cffi.

Flags concrete mismatches a real human never exhibits: Chrome UA with missing window.chrome, Windows UA on Linux platform, empty navigator.languages, outerWidth=0, headless default resolutions, navigator.webdriver=true. +12 per signal, cap +40.

Protects against
Puppeteer-stealth, Playwright-extra, Selenium UA-spoof, curl-impersonate.

Redis snapshot (4 h TTL) of device_hash, webgl_renderer, user_agent, timezone, screen_resolution at session start. Sensitive events (login, form submit, checkout) compare the live fingerprint; drift adds +40/+25/+20/+15/+10 respectively.

Protects against
Session hijacking, token replay, stolen-cookie attacks, mid-session device swaps.

OpenAI- and Anthropic-compatible base URL. Shield scans every prompt before forwarding and every completion before returning, blocks on policy hit, strips PII / secrets on stream.

Protects against
Prompt injection, jailbreak, PII / secret exfiltration from LLM apps.

Embedding-based detection across 14 attack categories. "Disregard earlier directives" ≈ "Ignore previous instructions" at cosine 0.70. Thresholds: ≥0.82 block, ≥0.68 challenge. Ollama-local embeddings — zero per-request API cost.

Protects against
Paraphrased prompt injection, synonym jailbreaks, obfuscated attacks, cross-language variants.

Tool-call interception for Claude / Cursor / IDE agents. JSON Schema validation of arguments, chain-step limit 50, domain allowlist, explicit approval gates on destructive tools. Inspects every invocation against agent-protection rules before execution.

Protects against
Malicious tool abuse, file / shell exfiltration, supply-chain agents, runaway agent loops.

40+ patterns scanning input + output + tool calls before / after the model runs. Runs alongside the Semantic Firewall for layered defence.

Protects against
Prompt injection, DAN-style jailbreaks, memory poisoning, tool abuse, data exfiltration.

5 tools exposed via MCP: shield_get_stats, shield_get_threats, shield_add_rule, shield_get_events, shield_verify_token. Let your Claude / Cursor agent investigate and act on incidents without leaving the chat.

Protects against
Blind admin response — agents can investigate and act on incidents programmatically.

AST-parsed SQL validation. Blocks UNION, INTO OUTFILE, pg_sleep, information_schema. LIMIT capped at 1000. Sensitive columns (password, api_key, ssn) auto-redacted. Query fingerprinting and honeytoken trap tables.

Protects against
SQL exfiltration, schema enumeration, pagination abuse, sensitive-data leaks.

Wallet detection: BTC (P2PKH/Bech32), ETH, SOL, TRX, XRP, LTC, DOGE. BIP-39 seed phrase scanning (12/24 word). Signing prompts (EIP-712). 14 mining domains blocked. Payment redirect patterns.

Protects against
Wallet theft, seed-phrase leakage, mining script injection, payment redirects.

Bigram gibberish detection (EN / DE / CS / SK / ES), 100+ disposable email domains, spam patterns (repeated chars, ALL CAPS, URL flood), suspicious name detection. Additive scoring: gibberish +15, disposable email +25, multi-field cluster bonus.

Protects against
Form spam, fake registrations, throwaway accounts, gibberish submissions.

check_upload() accepts form_fields. When a file upload is accompanied by form data (title, description, name, message), Content Quality Scoring runs on those fields too. A clean PDF with "test / asdf / qwerty" metadata still gets rejected at score ≥ 25.

Protects against
Fake account registrations, low-quality form spam with attachments, bot-filled support tickets.

Every file passes a quarantine gate — extension allowlist, magic-byte MIME sniffing, Office macro detection, PDF JavaScript / Launch / OpenAction, SVG / HTML script injection. Per-tenant max size and extension list.

Protects against
Malware drop, macro viruses, PDF-borne JS, SVG-XSS, polyglot files.

Three-tier honeypot per form with password-manager detection (1Password / Bitwarden / LastPass / Dashlane). Tier 1 (+80), Tier 2 (+40), Tier 3 (+15, auto-downgraded to +5 when PWM detected). Hidden /trap/{slug} URL endpoint — crawlers following /admin, /.env trigger cross-tenant flags.

Protects against
Form bots, crawler enumeration of hidden paths, credential-stuffing reconnaissance.

Python (FastAPI / Django / Flask), Node.js (Express / Next.js), PHP (WordPress / Laravel). Validates X-Shield-Token on every request. No token → 403. HMAC verify is cached 30 s per (token, path).

Protects against
Requests bypassing the JS widget (curl, Postman, Python requests, raw HTTP).

3-state breaker (closed / open / half_open) in all three backend SDKs. After 5 consecutive transport errors → OPEN for 30 s → 1 HALF_OPEN probe. 4xx doesn't trip the breaker. PHP uses APCu for cross-FPM-worker state. No more 5 s timeouts on every request during an upstream incident.

Protects against
Cascading timeouts, retry storms, request pile-up during Shield-API outages.

Reason → (machine_code, human_hint) map. /shield/verify and all 3 SDK 403 bodies return remediation + remediation_code. Legit false-positive users see "Your session expired — please reload" instead of a silent 403.

Protects against
Bad UX on false-positive, support ticket load, silent-fail confusion.

Drop-in PHP plugin: auto-injects the widget, ships middleware that validates Shield tokens on /wp-login.php and admin endpoints. Fail-closed by default, configurable.

Protects against
WordPress brute force, xmlrpc abuse, wp-admin enumeration on EU SMB sites.

Multi-dimensional: per-IP, per-device, per-endpoint. Progressive escalation: monitor → throttle → challenge → block. Redis-backed counters with sliding windows.

Protects against
Brute force, credential stuffing, scraping, API enumeration.

IP geolocation via ip-api.com (24 h cache). Per-site blocked / allowed country lists. Datacenter +10, proxy / Tor +15 score modifier. Page-load hard block with access-denied overlay before widget initialises.

Protects against
Traffic from disallowed regions, anonymising infrastructure, compliance-driven restrictions.

Widget prevents form submission at score > 85. Red overlay: "Blocked by Corpilus Shield". Server-signed HMAC-SHA256 tokens auto-attached to fetch() via interceptor.

Protects against
High-confidence bot submissions reaching the backend.

70+ compiled OWASP patterns scanned automatically on every event. Payload-level inspection happens before scoring.

Protects against
SQL injection, XSS, path traversal, command injection, SSRF, SSTI.

Hidden form fields invisible to humans. Proof-of-Work SHA-256 challenges on suspicious scores. Progressive login delay (1 s → 8 s).

Protects against
Spam bots, naive scrapers, brute-force login bursts.

GPT-4o-mini analyses events every 15 minutes. RAG context from Shield KB (8 security docs). Auto-creates threats and rules from real observations.

Protects against
Novel / unseen attack patterns missed by static rules.

Pre-built threat-intel context (mini-CAG). Bot signatures, attack patterns, OWASP samples baked in — new sites are protected from the first page view.

Protects against
Cold-start blindness — new sites are protected immediately.

Anonymised pattern sharing — IPs reduced to /24, PII stripped, maturity gating (experimental → candidate → confirmed). One tenant's confirmed attacker becomes everyone's known threat within minutes.

Protects against
Distributed campaigns hitting multiple Shield-protected sites.

Every 15 min a scheduler computes AI-rule creation velocity vs 7-day baseline. On a 3σ anomaly new rules auto-gate to rollout_state='canary' — they apply only to canary tenants for 24 h. Canary rules with ≥ 2 confirmations without FPs promote to 'confirmed'.

Protects against
Learning-layer poisoning, FP-DoS, self-whitelisting attacks, model corruption.

Widget MutationObserver snapshots all <script> tags at boot. Any subsequently injected script is reported as script_integrity_violation telemetry with src, external/same-origin, content length, stable hash. Capped at 25 reports per page-load. Tenant allowlist for trusted CDNs.

Protects against
Supply-chain attacks, malicious browser extensions, XSS token theft, ad-fraud overlays.

Email (HTML), Slack, Discord, generic JSON webhooks. Weekly security report with stats, top threats, block rate. Per-webhook severity gate (low / medium / high / critical).

Protects against
Late incident detection — admins notified within seconds.

Every rule change, site config edit, manual block, AI decision is recorded with actor, timestamp, before/after diff. Exportable for compliance audits.

Protects against
Silent tampering — and gives ISO / SOC 2 auditors a complete paper trail.

HMAC-SHA256 tokens are minted server-side from the per-site secret and returned via /shield/events. The widget never holds the signing secret — a leaked site_key cannot be used to forge valid tokens.

Protects against
Token forgery from a stolen public site_key.

PostgreSQL Row-Level Security forced on all shield_* tables. Each request runs under a tenant-scoped role — no application-layer bypass possible even if the API has a bug.

Protects against
Cross-tenant data leaks, broken-access-control bugs in app code.

Click any card to expand for the full description and threat model.

Ako to funguje

Zapadá do všetkého, čo Corpilus už beží.

Shield je postavený ako rozšírenie Corpilus AI mozgu — tá istá autentifikácia, tenant model, audit log, RLS aj billing. Žiadna paralelná infraštruktúra na prevádzku.

1

1 · Vložte widget

Jeden <script> tag na váš web. Widget automaticky chráni každý <form>, zbiera behavior telemetriu, pustí lokálny scorer a pripojí podpísaný HMAC token k odchádzajúcim requestom.

2

2 · Zabaľte backend

Tri riadky middleware (Python / Node / PHP). Každý mutation endpoint teraz vyžaduje validný Shield token — curl, Python requests, scrapy okamžite dostanú 403.

3

3 · Mozog sa učí

Každých 15 min analyzér agreguje udalosti cez váš tenant, generuje pravidlá, overuje ich voči cross-tenant vzorom a pushne updaty widgetu cez piggyback kanál.

Shield je pripravený. Poďme chrániť to, čo staviate.

Teraz onboardujeme prvých zákazníkov. Rezervujte si 20 minút — zmapujeme váš attack surface, nasadíme widget na staging web a v rámci hovoru uvidíte reálnu telemetriu.

Corpilus Shield · vyvinuté v Európe · GDPR-native · žiadne PII neopúšťa váš tenant