[
{
"type": "aporia_guardrails_test",
"category": "test",
"name": "AGT Test",
"description": "Test and verify that Guardrails are activated. Activate the policy by sending the following prompt: X5O!P%@AP[4\\PZX54(P^)7CC)7}$AGT-STANDARD-GUARDRAILS-TEST-MSG!$H+H*"
},
{
"type": "competition_discussion_on_prompt",
"category": "topics",
"name": "Competition Discussion - Prompt",
"description": "Detects any user attempt to start a discussion including the competition mentioned in the policy."
},
{
"type": "competition_discussion_on_response",
"category": "topics",
"name": "Competition Discussion - Response",
"description": "Detects any response including reference to the competition mentioned in the policy."
},
{
"type": "basic_restricted_topics_on_prompt",
"category": "topics",
"name": "Restricted Topics - Prompt",
"description": "Detects any user attempt to start a discussion on the topics mentioned in the policy."
},
{
"type": "basic_restricted_topics_on_response",
"category": "topics",
"name": "Restricted Topics - Response",
"description": "Detects any response including discussion on the topics mentioned in the policy."
},
{
"type": "sql_restricted_tables",
"category": "security",
"name": "SQL - Restricted Tables",
"description": "Detects generation of SQL statements with access to specific tables that are considered sensitive. It is recommended to activate the policy and define system tables, as well as other tables with sensitive information."
},
{
"type": "sql_allowed_tables",
"category": "security",
"name": "SQL - Allowed tables",
"description": "Detects SQL operations on tables that are not within the limits we set in the policy. Any operation on, or with another table that is not listed in the policy, will trigger the action configured in the policy. Enable this policy for achieving the finest level of security for your SQL statements."
},
{
"type": "sql_read_only_access",
"category": "security",
"name": "SQL - Read-Only Access",
"description": "Detects any attempt to use SQL operations which requires more than read-only access. Activating this policy is important to avoid accidental or malicious run of dangerous SQL queries like DROP, INSERT, UPDATE and others."
},
{
"type": "sql_load_limit",
"category": "security",
"name": "SQL - Load Limit",
"description": "Detects SQL statements that are likely to cause significant system load and affect performance."
},
{
"type": "basic_allowed_topics_on_prompt",
"category": "topics",
"name": "Allowed Topics - Prompt",
"description": "Ensures the conversation adheres to specific and well-defined topics."
},
{
"type": "basic_allowed_topics_on_response",
"category": "topics",
"name": "Allowed Topics - Response",
"description": "Ensures the conversation adheres to specific and well-defined topics."
},
{
"type": "prompt_injection",
"category": "prompt_injection",
"name": "Prompt Injection",
"description": "Detects any user attempt of prompt injection or jailbreak."
},
{
"type": "rag_hallucination",
"category": "hallucinations",
"name": "RAG Hallucination",
"description": "Detects any response that carries a high risk of hallucinations, thus maintaining the integrity and factual correctness of the information."
},
{
"type": "pii_on_prompt",
"category": "security",
"name": "PII - Prompt",
"description": "Detects existence of PII in the user message, based on the configured sensitive data types. "
},
{
"type": "pii_on_response",
"category": "security",
"name": "PII - Response",
"description": "Detects potential responses containing PII, based on the configured sensitive data types. "
},
{
"type": "toxicity_on_prompt",
"category": "toxicity",
"name": "Toxicity - Prompt",
"description": "Detects user messages containing toxicity."
},
{
"type": "toxicity_on_response",
"category": "toxicity",
"name": "Toxicity - Response",
"description": "Detects potential responses containing toxicity."
}
]