Skip to content

Network Inspection

Monitor AI traffic for PII, secrets, and policy violations. Block or redact sensitive data before it leaves your network.

Requirements

  • macOS 11+ or Linux (Ubuntu 20.04+, RHEL/CentOS, Arch)
  • Windows support planned
  • Admin/sudo access
  • ~600MB disk space for Presidio

Setup

The installer guides you through each step. First it shows Network Inspection:

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Network Inspection

Monitor and secure traffic to AI providers (OpenAI, Anthropic,
Google AI, etc.) with TLS inspection and PII detection.

Requires: CA certificate + sudo for daemon
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Current status:
  ✓ CA certificate exists
  ✓ CA installed in system trust store

Enable network inspection? (y/N):

Then PII Detection:

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
PII Detection

Detect and redact sensitive data (emails, SSNs, credit cards,
etc.) in AI prompts and responses.

Requires: Python + ~560MB for NLP models
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Current status:
  ✓ Python 3.11 available
  ✓ uv package manager installed
  ○ PII libraries: not installed

Install PII detection dependencies? (y/N):

Then Image PII Detection (only if PII dependencies are installed):

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Image PII Detection

Detect and redact PII in images (screenshots, documents, etc.)

Requires: Tesseract OCR + presidio-image-redactor
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Current status:
  ○ Tesseract: not installed
  ○ presidio-image-redactor: not installed

Enable PII Detection and Redaction in images? (y/N):

The installer validates what's already installed and only sets up missing components.

Enterprise Deployment

IT teams can pre-deploy CA certificates and Presidio via MDM. The installer will detect everything and show green checkmarks.

For manual setup, see Manual Setup.

What Gets Detected

PII Types

CategoryTypes
PersonalPERSON, EMAIL_ADDRESS, PHONE_NUMBER, ADDRESS
FinancialCREDIT_CARD, IBAN_CODE, CRYPTO
NetworkIP_ADDRESS, URL
OtherLOCATION, ORGANIZATION, DATE_TIME

Content Rules

33 built-in templates:

  • API Keys: GitHub (ghp_*), OpenAI (sk-*), AWS (AKIA*), Stripe, Slack
  • Private Keys: RSA, EC, OpenSSH, PGP
  • Database: PostgreSQL, MySQL, MongoDB, Redis connection strings
  • Cloud: Azure, GCP, Heroku tokens

Actions

ActionDescription
logRecord violation, allow request
blockReject request
redactReplace content, allow request

Dashboard

Configure in Dashboard → Network Inspection:

  • AI Domains - Enable/disable providers
  • Rules - Manage content rules
  • Violations - View detections
  • Settings - Feature toggles

File Locations

FileLocation
CA Certificate~/.cybercage/certs/ca.crt
CA Key~/.cybercage/certs/ca.key
Python venv~/.cybercage/.venv/

Manual Setup

1. Generate CA Certificate

bash
mkdir -p ~/.cybercage/certs && chmod 700 ~/.cybercage/certs

openssl genrsa -out ~/.cybercage/certs/ca.key 4096
openssl req -new -x509 -sha256 \
    -key ~/.cybercage/certs/ca.key \
    -out ~/.cybercage/certs/ca.crt \
    -days 3650 \
    -subj "/C=US/ST=CA/O=CyberCage/CN=CyberCage NetInspect CA"

chmod 600 ~/.cybercage/certs/ca.key

2. Install CA to System

macOS:

bash
sudo security add-trusted-cert -d -r trustRoot \
    -k /Library/Keychains/System.keychain \
    ~/.cybercage/certs/ca.crt

Linux (Debian/Ubuntu):

bash
sudo cp ~/.cybercage/certs/ca.crt /usr/local/share/ca-certificates/cybercage-ca.crt
sudo update-ca-certificates

Linux (RHEL/CentOS):

bash
sudo cp ~/.cybercage/certs/ca.crt /etc/pki/ca-trust/source/anchors/cybercage-ca.pem
sudo update-ca-trust

3. Install Presidio

bash
curl -LsSf https://astral.sh/uv/install.sh | sh
uv venv ~/.cybercage/.venv --python 3.11
uv pip install --python ~/.cybercage/.venv/bin/python \
    presidio-analyzer presidio-anonymizer
uv pip install --python ~/.cybercage/.venv/bin/python \
    https://github.com/explosion/spacy-models/releases/download/en_core_web_lg-3.8.0/en_core_web_lg-3.8.0-py3-none-any.whl

4. Optional: Image PII

macOS:

bash
brew install tesseract

Linux:

bash
sudo apt-get install tesseract-ocr  # Debian/Ubuntu

Then:

bash
uv pip install --python ~/.cybercage/.venv/bin/python presidio-image-redactor

5. Run Daemon

bash
sudo cybercage-daemon

Uninstall

Remove CA (macOS):

bash
sudo security delete-certificate -c "CyberCage NetInspect CA" \
    /Library/Keychains/System.keychain

Remove CA (Linux):

bash
sudo rm /usr/local/share/ca-certificates/cybercage-ca.crt
sudo update-ca-certificates --fresh

Remove local files:

bash
rm -rf ~/.cybercage/certs ~/.cybercage/.venv