AI security background

About Telluvian

We're building the infrastructure to secure AI systems in production, providing real-time protection against prompt injection, data leakage, and harmful outputs.

Telluvian team

About Us

Modern cybersecurity is built on projects such as the Common Vulnerabilities and Exposures (CVE) list and the National Vulnerability Database, allowing researchers to share knowledge and coordinate security efforts.

By open-sourcing a database of AI weaknesses and vulnerabilities, we build a powerful proprietary edge while helping actors around the world build safer and more reliable AI systems. Cloudflare isn't trusted to catch DDoS attacks just because of technology quality—the more services using their platform, the better their real-time threat detection. The largest player in AI security becomes exponentially more valuable as coverage grows.

Expertise
AI Security • Prompt Engineering • Threat Intelligence
Focus
Real-time Protection • Vulnerability Research • Developer Tools

Mission

We secure AI systems in production.

Vulnerabilities and misuse are not hypotheticals. ChatGPT connectors have been used to exfiltrate data from users' Google Drive, and Claude has been used to carry out large-scale cyberattacks. We need a safe and reliable rollout of AI which protects user privacy and gives developers unbreakable control.

Our input-output filtering catches harmful inputs in real-time, blocking prompt injections, data poisoning, and attempted exfiltration before they can cause damage.

AI security mission