EresusSecurity
Intro

Intro

Sentinel is a CLI-first security scanner for AI/LLM applications and model supply chains. These docs explain what each Sentinel finding detects, why it matters, and how to fix it.

Definition

Eresus Sentinel is a CLI-first security platform that reports model artifact, prompt, agent, MCP, container, secret, and AI supply-chain risks with rule IDs, severity, CWE, OWASP LLM mapping, and retest commands.

The goal is to make AI security documentation useful during engineering decisions: which file is risky, which finding should block a release, and which command should be used for retest.

With Sentinel, you can:

  • Find model artifact riskspickle, PyTorch, ONNX, GGUF, safetensors, and compressed bundles.
  • Test prompt and template securityprompt injection, unsafe Jinja2, RAG leakage, and guardrail bypass patterns.
  • Validate agent and MCP surfacesmanifests, permissions, tool boundaries, and network exposure.
  • Report in CI/CDJSON, SARIF, JUnit, CSV, HTML, and Markdown outputs.

Who uses Sentinel?

Sentinel is not built for a single persona. The developer downloading a model, the platform team building release gates, the researcher testing an LLM app, and the security lead explaining risk all use the same finding IDs.

TeamQuestionSentinel output
AI / MLCan this model file be loaded safely?Artifact findings, AIBOM, hash/provenance notes
AppSecCan the prompt, RAG, or agent flow leak data?Firewall, Jinja2, secret, network findings
PlatformShould this release stop or open an issue?SARIF/JUnit, severity, release gate policy

What Sentinel covers

  • Artifact scanningmodel files, archives, and model metadata.
  • Source code analysisAI/ML anti-pattern, data-flow, and dangerous-usage checks across Python and multi-language code.
  • Prompt Firewallprompt injection, jailbreak, and output guardrail checks.
  • Supply chaindependency, HuggingFace repository, and model provenance checks.

What Sentinel solves in the AI security risk map

AI security is not a single scanner category. Governance, development-time supply chain, input threats, runtime controls, agent permissions, privacy, and incident evidence have to be managed together. Sentinel focuses on applied evidence: scan the asset, close the finding by rule ID, reproduce it in CI/CD, and explain risk through OWASP LLM and CWE language.

Risk areaTeam questionSentinel evidence
GovernanceWhich AI asset is entering release and who owns the risk?AIBOM, owner, hash, provenance, and release decision
Development timeDo models, data, dependencies, or configuration come from the supply chain?Artifact scanning, CVE, manifest, and secret findings
Input threatsCan prompts, RAG documents, or user input change system behavior?Prompt Firewall, Jinja2, RAG leakage, and tool-argument evidence
RuntimeCan model output, tool calls, or augmentation data cross the trust boundary?Runtime Gateway decision, redacted evidence, and retest command
Incident and complianceCan management, AppSec, and engineering discuss the same finding consistently?OWASP LLM/CWE mapping, SARIF/JUnit output, and closure evidence

How outputs are used

Use readable tables for local review, SARIF or JUnit in CI/CD, and Markdown/HTML for security reports. The same finding ID stays consistent for engineering and security teams.

Recommended workflow

  1. Start with a small known model directory so the team understands scanner behavior.
  2. Map rule IDs and severity levels to your release policy.
  3. Attach remediation and retest commands to CRITICAL/HIGH findings.
  4. Map findings to OWASP LLM, CWE, and your internal risk language.

Which page answers which need?

Sentinel docs are not just a product menu. They provide decision pages for developers searching for an AI security scanner, AppSec teams searching for an LLM security scanner, platform teams searching for an MCP security scanner, and ML teams searching for a model artifact scanner.

NeedStart hereDecision you get
Is this model file safe?Pickle, PyTorch, GGUFWhether load should stop and whether hash/source evidence is enough.
Is there prompt injection or RAG leakage?Prompt Firewall, Jinja2Whether prompts, templates, or tool calls can pass the release gate.
Are agent and MCP tools over-permissioned?MCP / Agent Security, ManifestWhether tool permission should be narrowed and live discovery matches the manifest.
Which finding blocks CI/CD?Severity Guide, CI/CDCRITICAL/HIGH gate rules, MEDIUM issue tracking, and closure evidence.
GET STARTED

CLI

The shortest workflow starts with a single artifact scan, then expands to project and CI output.

sentinel artifact model.pt
sentinel artifact ./models/ -f sarif -o report.sarif
sentinel scan ./project/

FAQ

Does Sentinel replace a pentest?

No. Sentinel catches reproducible technical signals; live exploit chains, business-logic abuse, and risk acceptance still require manual security validation.

What search intent does Sentinel answer?

It serves teams searching for AI security scanner, LLM security scanner, prompt injection firewall, model artifact scanner, MCP security scanner, and AI supply chain security guidance.

Which command should run on day one?

Start with a small model directory: `sentinel artifact ./models/`. Then run `sentinel scan ./project/` and move SARIF output into CI.

How should findings be explained to customers?

Use OWASP LLM and business impact in the executive summary; include Sentinel rule ID, CWE, evidence, fix hint, and retest command in the technical appendix.

Eresus support

Turn the finding into an action your team can actually close.

If you need exploit evidence, prioritization, remediation direction, and retesting for an AI/LLM security program, Eresus can help scope the work with your team.

Start Security Test