Skip to content

Conversation

yossiovadia
Copy link
Collaborator

  • PII Detection: ✅ Working perfectly across all pathways

    • Batch API detects PII types (B-US_SSN, B-EMAIL_ADDRESS, etc.) with ~99% confidence
    • Direct PII API identifies entities correctly
    • ExtProc detects PII during routing decisions

    🚫 The Gap We Identified

    • PII content is detected but not blocked
    • Requests with sensitive PII (SSN, multiple PII types) pass through normally
    • No content filter responses for policy violations

…tion

🔍 ENHANCED PII TESTING FRAMEWORK:
- Added comprehensive ExtProc PII detection test (TEST 3.5)
- Tests differential behavior between PII and safe content
- Validates production pipeline PII handling capabilities
- Monitors routing decisions, processing times, and blocking behavior

📋 IMPROVED TEST COVERAGE:
- Enhanced test case generation with cache-busting timestamps
- Added comprehensive PII pattern analysis across multiple entity types
- Better detection of ExtProc PII filtering mechanisms
- More detailed logging and result analysis

⚙️ SMART PII POLICY CONFIGURATION:
- Model-A: Strict PII policy (allow_by_default: false, EMAIL_ADDRESS only)
- Model-B: Permissive PII policy (allow_by_default: true, all PII types)
- Mixed policy approach enables better testing of PII routing behavior

📊 TEST CAPABILITIES:
- Detects PII blocking vs routing-only behavior
- Monitors differential model selection based on PII content
- Validates security policy enforcement in production pipeline
- Comprehensive analysis of ExtProc PII detection indicators

This establishes a comprehensive testing framework that will reveal
any gaps in PII detection and policy enforcement across the entire
semantic router pipeline.

Signed-off-by: Yossi Ovadia <[email protected]>
Apply automatic Python code formatting from black to ensure
consistent code style across the test file. No functional
changes - only formatting improvements including:
- Trailing commas for better diffs
- Line wrapping for readability
- Consistent spacing around operators

Signed-off-by: Yossi Ovadia <[email protected]>
Copy link

netlify bot commented Oct 3, 2025

Deploy Preview for vllm-semantic-router ready!

Name Link
🔨 Latest commit 1327a1c
🔍 Latest deploy log https://app.netlify.com/projects/vllm-semantic-router/deploys/68e04044765e2500081aa4a7
😎 Deploy Preview https://deploy-preview-335--vllm-semantic-router.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link

github-actions bot commented Oct 3, 2025

👥 vLLM Semantic Team Notification

The following members have been identified for the changed files in this PR and have been automatically assigned:

📁 config

Owners: @rootfs
Files changed:

  • config/config.e2e.yaml

📁 e2e-tests

Owners: @yossiovadia
Files changed:

  • e2e-tests/06-pii-detection-test.py

vLLM

🎉 Thanks for your contributions!

This comment was automatically generated based on the OWNER files in the repository.

@rootfs rootfs merged commit 980405f into vllm-project:main Oct 3, 2025
9 checks passed
Aias00 pushed a commit to Aias00/semantic-router that referenced this pull request Oct 4, 2025
* feat: enhance PII detection testing with comprehensive ExtProc validation

🔍 ENHANCED PII TESTING FRAMEWORK:
- Added comprehensive ExtProc PII detection test (TEST 3.5)
- Tests differential behavior between PII and safe content
- Validates production pipeline PII handling capabilities
- Monitors routing decisions, processing times, and blocking behavior

📋 IMPROVED TEST COVERAGE:
- Enhanced test case generation with cache-busting timestamps
- Added comprehensive PII pattern analysis across multiple entity types
- Better detection of ExtProc PII filtering mechanisms
- More detailed logging and result analysis

⚙️ SMART PII POLICY CONFIGURATION:
- Model-A: Strict PII policy (allow_by_default: false, EMAIL_ADDRESS only)
- Model-B: Permissive PII policy (allow_by_default: true, all PII types)
- Mixed policy approach enables better testing of PII routing behavior

📊 TEST CAPABILITIES:
- Detects PII blocking vs routing-only behavior
- Monitors differential model selection based on PII content
- Validates security policy enforcement in production pipeline
- Comprehensive analysis of ExtProc PII detection indicators

This establishes a comprehensive testing framework that will reveal
any gaps in PII detection and policy enforcement across the entire
semantic router pipeline.

Signed-off-by: Yossi Ovadia <[email protected]>

* style: apply black formatting to PII detection test

Apply automatic Python code formatting from black to ensure
consistent code style across the test file. No functional
changes - only formatting improvements including:
- Trailing commas for better diffs
- Line wrapping for readability
- Consistent spacing around operators

Signed-off-by: Yossi Ovadia <[email protected]>

---------

Signed-off-by: Yossi Ovadia <[email protected]>
Signed-off-by: liuhy <[email protected]>
Aias00 pushed a commit to Aias00/semantic-router that referenced this pull request Oct 4, 2025
* feat: enhance PII detection testing with comprehensive ExtProc validation

🔍 ENHANCED PII TESTING FRAMEWORK:
- Added comprehensive ExtProc PII detection test (TEST 3.5)
- Tests differential behavior between PII and safe content
- Validates production pipeline PII handling capabilities
- Monitors routing decisions, processing times, and blocking behavior

📋 IMPROVED TEST COVERAGE:
- Enhanced test case generation with cache-busting timestamps
- Added comprehensive PII pattern analysis across multiple entity types
- Better detection of ExtProc PII filtering mechanisms
- More detailed logging and result analysis

⚙️ SMART PII POLICY CONFIGURATION:
- Model-A: Strict PII policy (allow_by_default: false, EMAIL_ADDRESS only)
- Model-B: Permissive PII policy (allow_by_default: true, all PII types)
- Mixed policy approach enables better testing of PII routing behavior

📊 TEST CAPABILITIES:
- Detects PII blocking vs routing-only behavior
- Monitors differential model selection based on PII content
- Validates security policy enforcement in production pipeline
- Comprehensive analysis of ExtProc PII detection indicators

This establishes a comprehensive testing framework that will reveal
any gaps in PII detection and policy enforcement across the entire
semantic router pipeline.

Signed-off-by: Yossi Ovadia <[email protected]>

* style: apply black formatting to PII detection test

Apply automatic Python code formatting from black to ensure
consistent code style across the test file. No functional
changes - only formatting improvements including:
- Trailing commas for better diffs
- Line wrapping for readability
- Consistent spacing around operators

Signed-off-by: Yossi Ovadia <[email protected]>

---------

Signed-off-by: Yossi Ovadia <[email protected]>
Signed-off-by: liuhy <[email protected]>
Aias00 pushed a commit to Aias00/semantic-router that referenced this pull request Oct 4, 2025
* feat: enhance PII detection testing with comprehensive ExtProc validation

🔍 ENHANCED PII TESTING FRAMEWORK:
- Added comprehensive ExtProc PII detection test (TEST 3.5)
- Tests differential behavior between PII and safe content
- Validates production pipeline PII handling capabilities
- Monitors routing decisions, processing times, and blocking behavior

📋 IMPROVED TEST COVERAGE:
- Enhanced test case generation with cache-busting timestamps
- Added comprehensive PII pattern analysis across multiple entity types
- Better detection of ExtProc PII filtering mechanisms
- More detailed logging and result analysis

⚙️ SMART PII POLICY CONFIGURATION:
- Model-A: Strict PII policy (allow_by_default: false, EMAIL_ADDRESS only)
- Model-B: Permissive PII policy (allow_by_default: true, all PII types)
- Mixed policy approach enables better testing of PII routing behavior

📊 TEST CAPABILITIES:
- Detects PII blocking vs routing-only behavior
- Monitors differential model selection based on PII content
- Validates security policy enforcement in production pipeline
- Comprehensive analysis of ExtProc PII detection indicators

This establishes a comprehensive testing framework that will reveal
any gaps in PII detection and policy enforcement across the entire
semantic router pipeline.

Signed-off-by: Yossi Ovadia <[email protected]>

* style: apply black formatting to PII detection test

Apply automatic Python code formatting from black to ensure
consistent code style across the test file. No functional
changes - only formatting improvements including:
- Trailing commas for better diffs
- Line wrapping for readability
- Consistent spacing around operators

Signed-off-by: Yossi Ovadia <[email protected]>

---------

Signed-off-by: Yossi Ovadia <[email protected]>
Signed-off-by: liuhy <[email protected]>
Aias00 pushed a commit to Aias00/semantic-router that referenced this pull request Oct 4, 2025
* feat: enhance PII detection testing with comprehensive ExtProc validation

🔍 ENHANCED PII TESTING FRAMEWORK:
- Added comprehensive ExtProc PII detection test (TEST 3.5)
- Tests differential behavior between PII and safe content
- Validates production pipeline PII handling capabilities
- Monitors routing decisions, processing times, and blocking behavior

📋 IMPROVED TEST COVERAGE:
- Enhanced test case generation with cache-busting timestamps
- Added comprehensive PII pattern analysis across multiple entity types
- Better detection of ExtProc PII filtering mechanisms
- More detailed logging and result analysis

⚙️ SMART PII POLICY CONFIGURATION:
- Model-A: Strict PII policy (allow_by_default: false, EMAIL_ADDRESS only)
- Model-B: Permissive PII policy (allow_by_default: true, all PII types)
- Mixed policy approach enables better testing of PII routing behavior

📊 TEST CAPABILITIES:
- Detects PII blocking vs routing-only behavior
- Monitors differential model selection based on PII content
- Validates security policy enforcement in production pipeline
- Comprehensive analysis of ExtProc PII detection indicators

This establishes a comprehensive testing framework that will reveal
any gaps in PII detection and policy enforcement across the entire
semantic router pipeline.

Signed-off-by: Yossi Ovadia <[email protected]>

* style: apply black formatting to PII detection test

Apply automatic Python code formatting from black to ensure
consistent code style across the test file. No functional
changes - only formatting improvements including:
- Trailing commas for better diffs
- Line wrapping for readability
- Consistent spacing around operators

Signed-off-by: Yossi Ovadia <[email protected]>

---------

Signed-off-by: Yossi Ovadia <[email protected]>
Signed-off-by: liuhy <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants