Built for the AI-native enterprise
Obfusca is a product of ThreatVisor, Inc. We build browser-native security tools that give organizations control over how sensitive data flows to AI services without slowing teams down.

AI is powerful, and an easy way to exfiltrate data
Developers paste source code into ChatGPT. Sales teams upload customer CSVs to Claude. Support staff share internal docs with Gemini. Every day, sensitive data leaves the browser through AI tools with no visibility or control.
Obfusca exists to solve this problem. We built a browser-native LLM firewall that scans prompts and file uploads in real time, detects secrets and PII, and enforces simple policies. All before data ever leaves the endpoint.
Security & privacy by design
Obfusca is designed so that we never have access to your sensitive data. Here is how.
No raw data storage
We never store raw prompts or files. The events table only contains content hashes (SHA-256 for deduplication), detection summaries with types and counts, and the action taken. Matched sensitive values are never logged.
Row-level security
Multi-tenant architecture with Supabase row-level security (RLS). Each organization can only access its own data. RLS policies are enforced at the database level using JWT tenant claims.
Immutable event log
Detection events cannot be updated or deleted by users. Only the service role can delete events for data retention purposes. This ensures a tamper-resistant audit trail.
Private deployment option
Enterprise customers can opt for single-tenant or fully private deployment. Run Obfusca on your own infrastructure with full control over data residency.
Compliance
Obfusca helps organizations meet regulatory requirements by preventing sensitive data from reaching third-party AI services.
GDPR
CCPA
Data never leaves the browser
Sensitive content is detected and redacted before it reaches any AI service. Raw prompts and files are never transmitted to or stored by Obfusca.
Privacy by architecture
Only anonymized metadata and detection pattern hits are logged. Content hashes are used for deduplication, not reconstruction. Your data stays yours.
Granular access control
Row-level security, role-based permissions, and domain-based auto-join give administrators full control over who can access what.
Ready to protect your AI usage?
Scan prompts and file uploads across 11 AI platforms. Detect secrets and PII in real time, then mask, redact, or replace sensitive data before it leaves the browser.