Your employees are pasting API keys into ChatGPT right now

Block sensitive data before it reaches AI tools

CompliTru scans every prompt in real-time and blocks sensitive data from being sent to ChatGPT, Claude, Gemini, and 11 other AI tools. Install in 30 seconds.

100% local detection <1ms scan time 20 detection patterns 30-second install

See It In Action

30 seconds. Real blocking. No setup.

CompliTru Chrome Extension Demo

How It Works

Three layers of protection

01

Detect as you type

A warning banner appears the instant you type or paste sensitive data into any AI tool. You see the risk before you hit send.

02

Block before it sends

When you submit a prompt, CompliTru intercepts the request and shows a blocking modal. The data never leaves your browser until you decide.

03

Log everything

Every detection and decision is logged. Enterprise admins see a centralized dashboard with audit trails, compliance reports, and Slack alerts.

Detection Engine

20 sensitive data patterns, 4 categories

Every pattern is mapped to compliance controls including SOC 2, HIPAA, PCI-DSS, NIST, and GDPR.

Credentials & Secrets

12 patterns

AWS KeysOpenAI KeysGitHub TokensStripe KeysPrivate KeysDatabase URLsPasswords

PII — Personal Data

5 patterns

Social Security NumbersCredit CardsIBANsEmail AddressesPhone Numbers

PHI — Health Data

2 patterns

Medical Record NumbersDates of Birth

Infrastructure

1 patterns

Internal IP Addresses (RFC 1918)

Coverage

Works on every major AI tool

Real-time fetch interception on 14 AI tools. Custom API parsing for the big 4.

ChatGPTCustomClaudeCustomGeminiCustomCopilotCustomPerplexityDeepSeekMistralGroqPoeYou.comHuggingFaceJasperWritesonicCohere

Plans

Free for individuals. Powerful for teams.

Feature
Free
Enterprise
Real-time prompt blocking
All 20 detection patterns
Works on 14+ AI tools
Local stats in popup
Centralized admin dashboard
Team-wide visibility
Slack/Teams alerts
Audit trail export (CSV)
Executive PDF reports
Compliance mapping (SOC 2, HIPAA, PCI)
Custom detection patterns
Policy enforcement (block tools)
Admin-push deployment
IdP integration (Okta, Azure AD)

FAQ

Common questions

Does my data leave my browser?

No. All detection happens locally in your browser using pattern matching. Nothing is transmitted unless you connect to the optional enterprise dashboard — and even then, data goes to YOUR CompliTru account over encrypted HTTPS.

Can users bypass the blocking?

Users can click "Send Anyway" on the blocking modal, but the event is logged. If deployed via Google Workspace admin push, the extension cannot be uninstalled or disabled by employees.

How does the blocking actually work?

The extension intercepts the browser's fetch() API before the prompt reaches the network. If sensitive data is detected, the fetch is paused and a modal appears. If blocked, a fake empty response is returned — the data physically never leaves your browser.

Does it slow down AI tools?

No. Pattern matching runs in under 1 millisecond. The only delay is when the blocking modal appears, which is intentional — it's protecting you.

Which browsers are supported?

Chrome (primary), Microsoft Edge, Brave, and Arc — all Chromium-based browsers. Firefox and Safari support is on the roadmap.

What if we already have a DLP solution?

Traditional DLP monitors network traffic or endpoints after data is sent. CompliTru intercepts at the browser layer before the data becomes network traffic. We complement existing DLP, not replace it.

How do we deploy to all employees?

Via Google Workspace Admin Console or Microsoft Intune. Force-install the extension to all managed browsers — employees cannot disable or remove it.

Stop the leak. Start in 30 seconds.

One leaked credential costs $5K–$50K in incident response. CompliTru pays for itself the first time it catches something.

Add to Chrome — Free