|
168 | 168 | "execution_count": null, |
169 | 169 | "outputs": [] |
170 | 170 | }, |
171 | | - { |
172 | | - "cell_type": "markdown", |
173 | | - "metadata": {}, |
174 | | - "source": [ |
175 | | - "* `is_detected(boolean)`: Indicates whether a prompt injection attack was detected in the provided message. In this example, it is False.\n", |
176 | | - " * `score(float: 0.0 - 1.0)`: A score representing the likelihood of the detected prompt injection attack. In this example, it is 0.0.\n", |
177 | | - " * `sanitized_message(string or null)`: For the prompt injection detector this field is null.\n", |
178 | | - " * `latency(float)`: Server-side latency of the request.\n", |
179 | | - "\n", |
180 | | - " **Error Codes:**\n", |
181 | | - "\n", |
182 | | - " * `401 Unauthorized`: API key is missing or invalid.\n", |
183 | | - " * `400 Bad Request`: The request body is malformed.\n", |
184 | | - " * `500 Internal Server Error`: Internal problem, please escalate to the team." |
185 | | - ] |
186 | | - }, |
| 171 | + { |
| 172 | + "cell_type": "markdown", |
| 173 | + "metadata": {}, |
| 174 | + "source": [ |
| 175 | + "* `is_detected(boolean)`: Indicates whether a prompt injection attack was detected in the provided message. In this example, it is False.\n", |
| 176 | + " * `score(float: 0.0 - 1.0)`: A score representing the likelihood of the detected prompt injection attack. In this example, it is 0.0.\n", |
| 177 | + " * `sanitized_message(string or null)`: For the prompt injection detector this field is null.\n", |
| 178 | + " * `latency(float)`: Server-side latency of the request.\n", |
| 179 | + "\n", |
| 180 | + " **Error Codes:**\n", |
| 181 | + "\n", |
| 182 | + " * `401 Unauthorized`: API key is missing or invalid.\n", |
| 183 | + " * `400 Bad Request`: The request body is malformed.\n", |
| 184 | + " * `500 Internal Server Error`: Internal problem, please escalate to the team." |
| 185 | + ] |
| 186 | + }, |
187 | 187 | ] |
188 | 188 | } |
0 commit comments