File tree Expand file tree Collapse file tree 1 file changed +18
-2
lines changed
Expand file tree Collapse file tree 1 file changed +18
-2
lines changed Original file line number Diff line number Diff line change 121121 "id" : " set-env"
122122 },
123123 "source" : [
124- " %set_env ZEN_API_KEY=\"\" "
124+ " %set_env ZEN_API_KEY=YOUR_API_KEY "
125125 ],
126126 "execution_count" : null ,
127127 "outputs" : []
167167 ],
168168 "execution_count" : null ,
169169 "outputs" : []
170- }
170+ },
171+ {
172+ "cell_type" : " markdown" ,
173+ "metadata" : {},
174+ "source" : [
175+ " * `is_detected(boolean)`: Indicates whether a prompt injection attack was detected in the provided message. In this example, it is False.\n " ,
176+ " * `score(float: 0.0 - 1.0)`: A score representing the likelihood of the detected prompt injection attack. In this example, it is 0.0.\n " ,
177+ " * `sanitized_message(string or null)`: For the prompt injection detector this field is null.\n " ,
178+ " * `latency(float)`: Server-side latency of the request.\n " ,
179+ " \n " ,
180+ " **Error Codes:**\n " ,
181+ " \n " ,
182+ " * `401 Unauthorized`: API key is missing or invalid.\n " ,
183+ " * `400 Bad Request`: The request body is malformed.\n " ,
184+ " * `500 Internal Server Error`: Internal problem, please escalate to the team."
185+ ]
186+ },
171187 ]
172188}
You can’t perform that action at this time.
0 commit comments