Network Inspection
Monitor AI traffic for PII, secrets, and policy violations. Block or redact sensitive data before it leaves your network.
Requirements
- macOS 11+ or Linux (Ubuntu 20.04+, RHEL/CentOS, Arch)
- Windows support planned
- Admin/sudo access
- ~600MB disk space for Presidio
Setup
The installer guides you through each step. First it shows Network Inspection:
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Network Inspection
Monitor and secure traffic to AI providers (OpenAI, Anthropic,
Google AI, etc.) with TLS inspection and PII detection.
Requires: CA certificate + sudo for daemon
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Current status:
✓ CA certificate exists
✓ CA installed in system trust store
Enable network inspection? (y/N):Then PII Detection:
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
PII Detection
Detect and redact sensitive data (emails, SSNs, credit cards,
etc.) in AI prompts and responses.
Requires: Python + ~560MB for NLP models
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Current status:
✓ Python 3.11 available
✓ uv package manager installed
○ PII libraries: not installed
Install PII detection dependencies? (y/N):Then Image PII Detection (only if PII dependencies are installed):
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Image PII Detection
Detect and redact PII in images (screenshots, documents, etc.)
Requires: Tesseract OCR + presidio-image-redactor
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Current status:
○ Tesseract: not installed
○ presidio-image-redactor: not installed
Enable PII Detection and Redaction in images? (y/N):The installer validates what's already installed and only sets up missing components.
Enterprise Deployment
IT teams can pre-deploy CA certificates and Presidio via MDM. The installer will detect everything and show green checkmarks.
For manual setup, see Manual Setup.
What Gets Detected
PII Types
| Category | Types |
|---|---|
| Personal | PERSON, EMAIL_ADDRESS, PHONE_NUMBER, ADDRESS |
| Financial | CREDIT_CARD, IBAN_CODE, CRYPTO |
| Network | IP_ADDRESS, URL |
| Other | LOCATION, ORGANIZATION, DATE_TIME |
Content Rules
33 built-in templates:
- API Keys: GitHub (
ghp_*), OpenAI (sk-*), AWS (AKIA*), Stripe, Slack - Private Keys: RSA, EC, OpenSSH, PGP
- Database: PostgreSQL, MySQL, MongoDB, Redis connection strings
- Cloud: Azure, GCP, Heroku tokens
Actions
| Action | Description |
|---|---|
| log | Record violation, allow request |
| block | Reject request |
| redact | Replace content, allow request |
Dashboard
Configure in Dashboard → Network Inspection:
- AI Domains - Enable/disable providers
- Rules - Manage content rules
- Violations - View detections
- Settings - Feature toggles
File Locations
| File | Location |
|---|---|
| CA Certificate | ~/.cybercage/certs/ca.crt |
| CA Key | ~/.cybercage/certs/ca.key |
| Python venv | ~/.cybercage/.venv/ |
Manual Setup
1. Generate CA Certificate
bash
mkdir -p ~/.cybercage/certs && chmod 700 ~/.cybercage/certs
openssl genrsa -out ~/.cybercage/certs/ca.key 4096
openssl req -new -x509 -sha256 \
-key ~/.cybercage/certs/ca.key \
-out ~/.cybercage/certs/ca.crt \
-days 3650 \
-subj "/C=US/ST=CA/O=CyberCage/CN=CyberCage NetInspect CA"
chmod 600 ~/.cybercage/certs/ca.key2. Install CA to System
macOS:
bash
sudo security add-trusted-cert -d -r trustRoot \
-k /Library/Keychains/System.keychain \
~/.cybercage/certs/ca.crtLinux (Debian/Ubuntu):
bash
sudo cp ~/.cybercage/certs/ca.crt /usr/local/share/ca-certificates/cybercage-ca.crt
sudo update-ca-certificatesLinux (RHEL/CentOS):
bash
sudo cp ~/.cybercage/certs/ca.crt /etc/pki/ca-trust/source/anchors/cybercage-ca.pem
sudo update-ca-trust3. Install Presidio
bash
curl -LsSf https://astral.sh/uv/install.sh | sh
uv venv ~/.cybercage/.venv --python 3.11
uv pip install --python ~/.cybercage/.venv/bin/python \
presidio-analyzer presidio-anonymizer
uv pip install --python ~/.cybercage/.venv/bin/python \
https://github.com/explosion/spacy-models/releases/download/en_core_web_lg-3.8.0/en_core_web_lg-3.8.0-py3-none-any.whl4. Optional: Image PII
macOS:
bash
brew install tesseractLinux:
bash
sudo apt-get install tesseract-ocr # Debian/UbuntuThen:
bash
uv pip install --python ~/.cybercage/.venv/bin/python presidio-image-redactor5. Run Daemon
bash
sudo cybercage-daemonUninstall
Remove CA (macOS):
bash
sudo security delete-certificate -c "CyberCage NetInspect CA" \
/Library/Keychains/System.keychainRemove CA (Linux):
bash
sudo rm /usr/local/share/ca-certificates/cybercage-ca.crt
sudo update-ca-certificates --freshRemove local files:
bash
rm -rf ~/.cybercage/certs ~/.cybercage/.venv