Skip to content

CloakPrompt is a CLI tool that redacts secrets (passwords, API keys, credentials, etc.) before sending data to AI models.

License

Notifications You must be signed in to change notification settings

Kushagratandon12/cloakprompt-cli

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”’ CloakPrompt CLI

Secure text redaction for LLM interactions

CloakPrompt is a command-line tool that automatically detects and redacts sensitive information (API keys, passwords, emails, IPs, etc.) from text before sending it to Large Language Models (LLMs). This helps protect your privacy and security when using AI services.

✨ Features

  • Comprehensive Pattern Detection: Pre-configured regex patterns for common sensitive data types
  • Multiple Input Sources: Support for inline text, files, and stdin piping
  • Custom Configuration: Extend or override default patterns with your own security rules
  • Rich Output: Beautiful terminal interface with progress indicators and detailed reporting
  • Production Ready: Well-tested, documented, and maintainable code
  • Privacy First: No data is sent to external services - all processing happens locally

πŸš€ Quick Start

Installation

# Clone the repository
git clone https://github.com/Kushagratandon12/cloakprompt-cli.git
cd cloakprompt-cli

# Install dependencies
pip install -r requirements.txt

# Install the package
pip install -e .

Basic Usage

# Redact inline text
cloakprompt redact --text "my secret key is AKIA1234567890ABCDEF"

# Redact a file
cloakprompt redact --file config.log

# Redact from stdin (piped input)
echo "secret data" | cloakprompt redact --stdin

# Use custom configuration
cloakprompt redact --file app.log --config security.yaml

πŸ“– Detailed Usage

img.png

Command Structure

cloakprompt redact [OPTIONS]

Options

Option Short Description
--text TEXT -t Text to redact (inline)
--file PATH -f File to redact
--stdin Read from stdin (piped input)
--config PATH -c Custom configuration file
--verbose -v Enable verbose logging
--quiet -q Suppress all output except errors
--summary -s Show pattern summary and exit
--details -d Show detailed redaction information

Examples

1. Redact Inline Text

cloakprompt redact --text "My AWS key is AKIA1234567890ABCDEF and password is secret123"

Output:

πŸ”’ CLOAKPROMPT
Secure text redaction for LLM interactions

βœ“ Redacted 2 sensitive items
My AWS key is <REDACT_AWS_ACCESS_KEY> and password is <REDACT_PASSWORD>

2. Redact File Content

cloakprompt redact --file application.log

3. Redact with Custom Configuration

cloakprompt redact --file config.yaml --config my-security-rules.yaml

4. Redact from Stdin

cat sensitive.log | cloakprompt redact --stdin

5. Show Pattern Summary

cloakprompt patterns

6. Show Redaction Details

cloakprompt redact --text "secret data" --details

πŸ›‘οΈ Supported Patterns

CloakPrompt comes with pre-configured patterns for:

  • API Keys: OpenAI, Google, Stripe, GitHub, Slack, etc.
  • AWS Credentials: Access keys, secret keys
  • Database URLs: PostgreSQL, MySQL, Redis, MongoDB, etc.
  • Tokens: JWT, OAuth, Personal Access Tokens
  • Kubernetes: Configs, secrets, service accounts
  • SSH Keys: Private key files
  • Cloud Provider Keys: Azure, GCP, DigitalOcean, etc.
  • PII: Emails, phone numbers, IP addresses, credit cards
  • Generic Secrets: Base64 encoded data, long random strings

βš™οΈ Configuration

Default Configuration

The tool uses cloakprompt/config/regex_cleanup.yaml by default, which contains comprehensive patterns for common sensitive data types.

Custom Configuration

Create your own security.yaml file to extend or override default patterns:

# Example custom security.yaml
patterns:
  CUSTOM_PATTERNS:
    description: "Custom patterns for my organization"
    rules:
      - name: internal_api_key
        placeholder: <REDACT_INTERNAL_API_KEY>
        regex: '\binternal[_-]?api[_-]?key\s*[:=]\s*["'']?[A-Za-z0-9_\-]{20,}["'']?\b'
      
      - name: company_secret
        placeholder: <REDACT_COMPANY_SECRET>
        regex: '\bcompany[_-]?secret\s*[:=]\s*["'']?[A-Za-z0-9!@#$%^&*()_+=-]{8,}["'']?\b'

Configuration Merging

Custom configurations are merged with the default configuration:

  • New categories are added
  • Existing rules are updated if they have the same name
  • New rules are appended to existing categories

πŸ—οΈ Architecture

cloakprompt/
β”œβ”€β”€ cli.py              # CLI entry point (Typer)
β”œβ”€β”€ core/
β”‚   β”œβ”€β”€ parser.py       # YAML configuration parser
β”‚   └── redactor.py     # Text redaction engine
β”œβ”€β”€ utils/
β”‚   └── file_loader.py  # Input handling utilities
└── config/
    └── regex_cleanup.yaml  # Default patterns

Core Components

  • ConfigParser: Loads and merges YAML configuration files
  • TextRedactor: Applies regex patterns to redact sensitive information
  • InputLoader: Handles different input sources (text, file, stdin)
  • CLI: Orchestrates the redaction process with rich terminal output

πŸ§ͺ Testing

# Install test dependencies
pip install pytest pytest-cov

# Run tests
pytest

# Run with coverage
pytest --cov=cloakprompt

πŸ“¦ Development

Project Structure

β”œβ”€β”€ cloakprompt/           # Main package
β”‚   β”œβ”€β”€ __init__.py       # Package initialization
β”‚   β”œβ”€β”€ cli.py            # CLI entry point
β”‚   β”œβ”€β”€ core/             # Core functionality
β”‚   β”‚   β”œβ”€β”€ __init__.py
β”‚   β”‚   β”œβ”€β”€ parser.py     # Configuration parser
β”‚   β”‚   └── redactor.py   # Text redactor
β”‚   β”œβ”€β”€ utils/            # Utility functions
β”‚   β”‚   β”œβ”€β”€ __init__.py
β”‚   β”‚   └── file_loader.py # Input handling
β”‚   └── config/           # Configuration files
β”‚       └── regex_cleanup.yaml
β”œβ”€β”€ requirements.txt       # Dependencies
β”œβ”€β”€ setup.py              # Installation script
└── README.md             # This file

Adding New Patterns

  1. Edit cloakprompt/config/regex_cleanup.yaml
  2. Add new rules under appropriate categories
  3. Test with sample data
  4. Update documentation if needed

Code Quality

The project uses:

  • Type hints for better code quality
  • Comprehensive docstrings for all functions
  • Logging for debugging and monitoring
  • Error handling for robust operation
  • Unit tests for reliability

🀝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests if applicable
  5. Submit a pull request

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

πŸ†˜ Support

πŸ”’ Security

  • All processing happens locally - no data is sent to external services
  • Regex patterns are designed to catch common sensitive data formats
  • Custom configurations allow organization-specific security rules
  • The tool is open source for transparency and community review

Built with ❀️ for privacy and security in AI interactions

About

CloakPrompt is a CLI tool that redacts secrets (passwords, API keys, credentials, etc.) before sending data to AI models.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published