New · AI-powered security, self-learning

The era of vibe coding & AI agents needsa smarter shield.

In a world where anyone ships a website in an afternoon — and bots, scraping agents and prompt-injection attacks scale overnight — your first line of defense has to learn as fast as they do. Corpilus Shield is an AI layer that sits in front of your forms, LLM chats, MCP tools and data sources and blocks attacks before they reach your logic.

Single JS widget3-line backend SDKLearns per tenant€ priced for SMBs
Bots
LLM
MCP
Web
Corpilus Shield
The 2026 threat landscape

Attackers got AI. Your forms and chatbots didn't.

Vibe-coded websites, no-code stores and half-finished LLM integrations are going live faster than any security team can audit them. On the other side, attackers now run Playwright-stealth at scale, pay cents per captcha solve, and chain LLMs to probe your prompt until it leaks system instructions or customer data.

Generic WAFs see HTTP packets. reCAPTCHA sees a token. Neither understands the intent of an agent submitting your support form, hijacking a token, or prompt-injecting your own AI into leaking the customer database. Corpilus Shield does — and it learns from every attempt on every tenant.

47%
of 2026 web traffic is non-human (bots, scrapers, AI agents)
< 5 min
typical time from vibe-coded launch to first bot probe
$0.001
attacker cost per CAPTCHA solve via AI farms
14 cats.
of prompt-injection patterns Shield catches out of the box
Corpilus Shield

A self-learning AI layer in front of everything you ship.

Built as an extension of the Corpilus AI brain — the same engine that answers your team's questions, now watching your frontdoor. Real-time signals, cross-tenant learning, transparent audit log.

AI-native, not a rule box

Baseline knowledge from OWASP + 85 attack embeddings, augmented by AI analyser that compiles new rules every 15 minutes based on what it sees.

One brain, many surfaces

The same Shield protects your forms, login pages, LLM chats, MCP tools, file uploads and SQL data sources. One dashboard, one audit log.

Plug-and-play

A single <script> tag and 3 lines of backend middleware (Python, Node, PHP). No DNS re-point. No TLS termination. Coexists with your CDN, WAF and analytics.

SMB-friendly pricing

Enterprise-grade defense at SaaS prices. Start free, scale as your traffic grows. Pay for real protection, not per-request magic numbers.

Capabilities

What Shield actually does.

Every capability below is live, measured in production, and documented in the customer dashboard. All signals are tunable per site.

33
Capabilities live
9
Shipped this sprint
8
Category groups
100%
Exercised in tests

Keystroke dynamics, mouse trajectory R², scroll patterns, touch events, form-fill timing, page-dwell — 28 real-time signals fed into the local scorer and backend scoring pipeline.

Protects against
Form-fill bots, headless automation, scripted submissions.

Canvas, WebGL, audio context, font detection, navigator fingerprinting fused into a SHA-256 device hash. Detects headless browsers and anti-detect tools.

Protects against
Puppeteer, Playwright, Selenium, PhantomJS, Camoufox, curl-cffi.

Flags concrete mismatches a real human never exhibits: Chrome UA with missing window.chrome, Windows UA on Linux platform, empty navigator.languages, outerWidth=0, headless default resolutions, navigator.webdriver=true. +12 per signal, cap +40.

Protects against
Puppeteer-stealth, Playwright-extra, Selenium UA-spoof, curl-impersonate.

Redis snapshot (4 h TTL) of device_hash, webgl_renderer, user_agent, timezone, screen_resolution at session start. Sensitive events (login, form submit, checkout) compare the live fingerprint; drift adds +40/+25/+20/+15/+10 respectively.

Protects against
Session hijacking, token replay, stolen-cookie attacks, mid-session device swaps.

OpenAI- and Anthropic-compatible base URL. Shield scans every prompt before forwarding and every completion before returning, blocks on policy hit, strips PII / secrets on stream.

Protects against
Prompt injection, jailbreak, PII / secret exfiltration from LLM apps.

Embedding-based detection across 14 attack categories. "Disregard earlier directives" ≈ "Ignore previous instructions" at cosine 0.70. Thresholds: ≥0.82 block, ≥0.68 challenge. Ollama-local embeddings — zero per-request API cost.

Protects against
Paraphrased prompt injection, synonym jailbreaks, obfuscated attacks, cross-language variants.

Tool-call interception for Claude / Cursor / IDE agents. JSON Schema validation of arguments, chain-step limit 50, domain allowlist, explicit approval gates on destructive tools. Inspects every invocation against agent-protection rules before execution.

Protects against
Malicious tool abuse, file / shell exfiltration, supply-chain agents, runaway agent loops.

40+ patterns scanning input + output + tool calls before / after the model runs. Runs alongside the Semantic Firewall for layered defence.

Protects against
Prompt injection, DAN-style jailbreaks, memory poisoning, tool abuse, data exfiltration.

5 tools exposed via MCP: shield_get_stats, shield_get_threats, shield_add_rule, shield_get_events, shield_verify_token. Let your Claude / Cursor agent investigate and act on incidents without leaving the chat.

Protects against
Blind admin response — agents can investigate and act on incidents programmatically.

AST-parsed SQL validation. Blocks UNION, INTO OUTFILE, pg_sleep, information_schema. LIMIT capped at 1000. Sensitive columns (password, api_key, ssn) auto-redacted. Query fingerprinting and honeytoken trap tables.

Protects against
SQL exfiltration, schema enumeration, pagination abuse, sensitive-data leaks.

Wallet detection: BTC (P2PKH/Bech32), ETH, SOL, TRX, XRP, LTC, DOGE. BIP-39 seed phrase scanning (12/24 word). Signing prompts (EIP-712). 14 mining domains blocked. Payment redirect patterns.

Protects against
Wallet theft, seed-phrase leakage, mining script injection, payment redirects.

Bigram gibberish detection (EN / DE / CS / SK / ES), 100+ disposable email domains, spam patterns (repeated chars, ALL CAPS, URL flood), suspicious name detection. Additive scoring: gibberish +15, disposable email +25, multi-field cluster bonus.

Protects against
Form spam, fake registrations, throwaway accounts, gibberish submissions.

check_upload() accepts form_fields. When a file upload is accompanied by form data (title, description, name, message), Content Quality Scoring runs on those fields too. A clean PDF with "test / asdf / qwerty" metadata still gets rejected at score ≥ 25.

Protects against
Fake account registrations, low-quality form spam with attachments, bot-filled support tickets.

Every file passes a quarantine gate — extension allowlist, magic-byte MIME sniffing, Office macro detection, PDF JavaScript / Launch / OpenAction, SVG / HTML script injection. Per-tenant max size and extension list.

Protects against
Malware drop, macro viruses, PDF-borne JS, SVG-XSS, polyglot files.

Three-tier honeypot per form with password-manager detection (1Password / Bitwarden / LastPass / Dashlane). Tier 1 (+80), Tier 2 (+40), Tier 3 (+15, auto-downgraded to +5 when PWM detected). Hidden /trap/{slug} URL endpoint — crawlers following /admin, /.env trigger cross-tenant flags.

Protects against
Form bots, crawler enumeration of hidden paths, credential-stuffing reconnaissance.

Python (FastAPI / Django / Flask), Node.js (Express / Next.js), PHP (WordPress / Laravel). Validates X-Shield-Token on every request. No token → 403. HMAC verify is cached 30 s per (token, path).

Protects against
Requests bypassing the JS widget (curl, Postman, Python requests, raw HTTP).

3-state breaker (closed / open / half_open) in all three backend SDKs. After 5 consecutive transport errors → OPEN for 30 s → 1 HALF_OPEN probe. 4xx doesn't trip the breaker. PHP uses APCu for cross-FPM-worker state. No more 5 s timeouts on every request during an upstream incident.

Protects against
Cascading timeouts, retry storms, request pile-up during Shield-API outages.

Reason → (machine_code, human_hint) map. /shield/verify and all 3 SDK 403 bodies return remediation + remediation_code. Legit false-positive users see "Your session expired — please reload" instead of a silent 403.

Protects against
Bad UX on false-positive, support ticket load, silent-fail confusion.

Drop-in PHP plugin: auto-injects the widget, ships middleware that validates Shield tokens on /wp-login.php and admin endpoints. Fail-closed by default, configurable.

Protects against
WordPress brute force, xmlrpc abuse, wp-admin enumeration on EU SMB sites.

Multi-dimensional: per-IP, per-device, per-endpoint. Progressive escalation: monitor → throttle → challenge → block. Redis-backed counters with sliding windows.

Protects against
Brute force, credential stuffing, scraping, API enumeration.

IP geolocation via ip-api.com (24 h cache). Per-site blocked / allowed country lists. Datacenter +10, proxy / Tor +15 score modifier. Page-load hard block with access-denied overlay before widget initialises.

Protects against
Traffic from disallowed regions, anonymising infrastructure, compliance-driven restrictions.

Widget prevents form submission at score > 85. Red overlay: "Blocked by Corpilus Shield". Server-signed HMAC-SHA256 tokens auto-attached to fetch() via interceptor.

Protects against
High-confidence bot submissions reaching the backend.

70+ compiled OWASP patterns scanned automatically on every event. Payload-level inspection happens before scoring.

Protects against
SQL injection, XSS, path traversal, command injection, SSRF, SSTI.

Hidden form fields invisible to humans. Proof-of-Work SHA-256 challenges on suspicious scores. Progressive login delay (1 s → 8 s).

Protects against
Spam bots, naive scrapers, brute-force login bursts.

GPT-4o-mini analyses events every 15 minutes. RAG context from Shield KB (8 security docs). Auto-creates threats and rules from real observations.

Protects against
Novel / unseen attack patterns missed by static rules.

Pre-built threat-intel context (mini-CAG). Bot signatures, attack patterns, OWASP samples baked in — new sites are protected from the first page view.

Protects against
Cold-start blindness — new sites are protected immediately.

Anonymised pattern sharing — IPs reduced to /24, PII stripped, maturity gating (experimental → candidate → confirmed). One tenant's confirmed attacker becomes everyone's known threat within minutes.

Protects against
Distributed campaigns hitting multiple Shield-protected sites.

Every 15 min a scheduler computes AI-rule creation velocity vs 7-day baseline. On a 3σ anomaly new rules auto-gate to rollout_state='canary' — they apply only to canary tenants for 24 h. Canary rules with ≥ 2 confirmations without FPs promote to 'confirmed'.

Protects against
Learning-layer poisoning, FP-DoS, self-whitelisting attacks, model corruption.

Widget MutationObserver snapshots all <script> tags at boot. Any subsequently injected script is reported as script_integrity_violation telemetry with src, external/same-origin, content length, stable hash. Capped at 25 reports per page-load. Tenant allowlist for trusted CDNs.

Protects against
Supply-chain attacks, malicious browser extensions, XSS token theft, ad-fraud overlays.

Email (HTML), Slack, Discord, generic JSON webhooks. Weekly security report with stats, top threats, block rate. Per-webhook severity gate (low / medium / high / critical).

Protects against
Late incident detection — admins notified within seconds.

Every rule change, site config edit, manual block, AI decision is recorded with actor, timestamp, before/after diff. Exportable for compliance audits.

Protects against
Silent tampering — and gives ISO / SOC 2 auditors a complete paper trail.

HMAC-SHA256 tokens are minted server-side from the per-site secret and returned via /shield/events. The widget never holds the signing secret — a leaked site_key cannot be used to forge valid tokens.

Protects against
Token forgery from a stolen public site_key.

PostgreSQL Row-Level Security forced on all shield_* tables. Each request runs under a tenant-scoped role — no application-layer bypass possible even if the API has a bug.

Protects against
Cross-tenant data leaks, broken-access-control bugs in app code.

Click any card to expand for the full description and threat model.

How it works

Plugs into everything Corpilus already runs.

Shield is built as an extension of the Corpilus AI brain — the same authentication, tenant model, audit log, RLS, and billing. No parallel infrastructure to operate.

1

1 · Drop the widget

One <script> tag on your site. The widget auto-protects every <form>, collects behavior telemetry, runs the local scorer and attaches a signed HMAC token to outbound requests.

2

2 · Wrap your backend

Three lines of middleware (Python / Node / PHP). Every mutation endpoint now requires a valid Shield token — curl, Python requests, scrapy instantly return 403.

3

3 · The brain learns

Every 15 min the analyser aggregates events across your tenant, generates rules, runs them against cross-tenant patterns, and pushes updates to the widget via a piggyback channel.

Shield is ready. Let's protect what you're building.

We're onboarding first customers now. Book 20 minutes — we'll map your attack surface, install the widget on a staging site, and show you real telemetry within the call.

Corpilus Shield · built in Europe · GDPR-native · no PII leaves your tenant