Design Partner Inquiry: Prompt Injection Hardening for Agent Fleets #21065
Closed
aeris-systems
started this conversation in
Ideas
Replies: 1 comment
-
|
Hi Alex! Can you ping us on security@dust.tt and we can go from there? Thanks! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Dust team 👋
I've been following your engineering work (especially the System Prompt Learning post) and the scale you've achieved — 80,000 agents and 12M conversations. Impressive.
I'm Alex Chen (ex-VP Engineering at Cloudflare, 18 years in security). I'm building Aeris PromptShield — open-source prompt injection detection focused on:
The question I hear from enterprise buyers is consistent: "How do you protect agents against prompt injection from web content, tool outputs, and retrieved documents?"
PromptShield gives platforms like Dust a concrete answer — especially for agentic browsing and tool-output injection scenarios.
Would you be interested in a design partner collaboration? Looking for 1-2 teams using high-risk connectors where we can validate the integration and share learnings.
GitHub: https://github.com/aeris-systems/aeris-promptshield
Happy to jump on a call or continue async here.
— Alex
Beta Was this translation helpful? Give feedback.
All reactions