DotShield

Involucrum

"Reads the interaction layer"

Threats hide in the signal

AI Security Layer — Intent Forensics

Threats hidein the signal,not the text.

DotShield™ Involucrum is being developed to assess interaction patterns, intent divergence, and adversarial prompt behaviour before sensitive prompts reach external AI systems.

// Capability previewPoC ready

Standard filters inspect text. Involucrum is being designed to assess the interaction layer.

Divergence
Covert logic
Exfil risk
Anomalies

Intent divergence: the visible request appears harmless, but the prompt structure begins to drift toward a different operational objective.

Hidden instructions: concealed directives attempt to influence the AI response without being obvious in the visible text.

Data exfiltration: sensitive identifiers, business records, or regulated data may be requested or routed in ways the user did not intend.

AI misuse patterns: repeated interaction behaviour may suggest unsafe automation, policy bypass, or unauthorised workflow manipulation.

// Cross-sector protection

Every industry.Every threat vector.

Involucrum identifies covert misuse patterns that standard controls cannot see — across cybersecurity operations, healthcare, legal environments, and other high-trust workflows where AI is becoming part of daily decision-making.

01

Hidden instruction chains

Detects concealed prompt sequences that attempt to redirect the AI away from the user’s visible intent.

02

Data exfiltration cues

Flags attempts to leak sensitive, privileged, regulated, or commercially confidential information.

03

Workflow manipulation

Identifies patterns that attempt to alter business decisions, approvals, payments, or instructions.

04

Covert misuse behaviour

Looks beyond keywords to detect structural, behavioural, and interaction-level misuse patterns.

// Pricing and deployment tiers

Choose the deployment model first. Then estimate monthly cost.

Every tier starts with on-device detection. The deployment model determines how prompts are protected, where encryption is controlled, and how much of the network attack surface is reduced.

// Included in selected tier
// Illustrative attack surface reduction
Prices are indicative and shown in AUD. API usage is estimated using selected provider, scan volume, and assumed input/output token sizes. AI API usage is indicative. Provider prices are converted from USD to AUD using an assumed FX rate of 1.40 and should be verified before quotation.