SSNs, credit cards, API keys, health records — intercepted and redacted before they leave your system. Passage sits between your application and any external LLM or API and enforces a zero-leakage policy.
POST / {"prompt": "Patient SSN: 123-45-6789, diagnose this"}
→ {"error": "POLICY_VIOLATION", "blocked": ["ssn_pattern"]}
POST / {"prompt": "What are symptoms of a cold?"}
→ {"response": "..."} ✓ clean request passes through
Sovereign architecture — all decisions made locally, no data sent to classify. HIPAA · GDPR · SOC2 · Part of the NAAb ecosystem
- Sovereign Architecture — NAAb owns all decisions, polyglot workers are "dumb muscle"
- Self-Synthesizing — Compiles binaries at boot, SHA-256 verified
- Hardware Isolation — CPU pinning, network namespaces
- Anti-Smuggling — Strict schema enforcement
- Privacy-First — HIPAA, GDPR, SOC2 compliant
See NAAb Passage in action detecting and blocking PII leakage:
Safe API request with no sensitive data → ALLOWED
Request containing SSN, credit card, and email → BLOCKED
Passage detected:
- ✗ Email:
john.doe@example.com(Score: 20) - ✗ SSN:
123-45-6789(Score: 100) - ✗ Credit Card:
4532-****-****-9010(Score: 80) - Total Risk: 200 (threshold: 90) → BLOCKED
Unauthorized field in request → BLOCKED
Try the demo yourself:
cd demos
./passage-demo.shSee DEMO_GUIDE.md for recording instructions.
# Clone with submodule
git clone --recursive https://github.com/b-macker/naab-passage.git
cd naab-passage
# Build NAAb
bash build.sh
# Start gateway
./naab/build/naab-lang main.naab
# Test request (in another terminal)
curl -X POST http://localhost:8091/ -d '{"model": "gpt-4", "messages": ["Hello"]}'HTTP → Go Gateway → NAAb Brain → Decision
↓
Schema ✓
PII ✓
Risk ✓
Components:
- NAAb Brain (Python) - Sovereign decision engine with PII detection
- Go Gateway - HTTP/TLS proxy (forwards to brain via Unix socket)
- Rust Shield - Constant-time pattern scanner (network-isolated)
Security:
- Self-synthesizing workers with SHA-256 verification
- Forensic source shredding (3-pass overwrite)
- Hardware isolation (CPU pinning via
taskset, network namespaces viaunshare -n) - Anti-smuggling schema validation
- Hash-chained audit logging
PII Detection:
- Social Security Numbers (SSN)
- Credit card numbers
- Email addresses
- High-entropy secrets
- Custom patterns via configuration
Edit config/risk_matrix.json to customize PII policies:
{
"policies": [
{"type": "ID_SSN", "score": 100, "action": "BLOCK"},
{"type": "FIN_CREDIT_CARD", "score": 80, "action": "BLOCK"},
{"type": "SEC_HIGH_ENTROPY", "score": 40, "action": "REDACT"},
{"type": "ID_EMAIL", "score": 20, "action": "AUDIT"}
],
"thresholds": {
"block": 90,
"redact": 40
}
}- Privacy-First LLM Gateway - Use ChatGPT/Claude without leaking SSNs, API keys, customer names
- Zero-Trust Edge Security - Protect legacy APIs from injection and malformed data
- Self-Healing Security Appliances - Deploy in hostile clouds, auto-rebuild if tampered
# Run test suite
./naab/build/naab-lang verify_vigilant_v7.naab- NAAb Language — Core polyglot scripting language with governance
- NAAb BOLO — Code governance & AI validation (50+ checks)
- NAAb Pivot — Code evolution & optimization (3-60x speedups)
- NAAb Passage (this project) — Data gateway & PII protection (zero leakage)
MIT License - see LICENSE for details.
Brandon Mackert - @b-macker
NAAb Passage — Secure passage for sensitive data.


