mirror of
https://github.com/syntrex-lab/gomcp.git
synced 2026-04-28 05:46:22 +02:00
fix: resolve remaining localization, documentation routing bugs, and restore soc_handlers comments
This commit is contained in:
parent
2c27cf1bf7
commit
02b511a41e
1 changed files with 6 additions and 0 deletions
|
|
@ -1504,6 +1504,12 @@ func (s *Server) handleSLAConfig(w http.ResponseWriter, _ *http.Request) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// handlePublicScan provides a public (no-auth) prompt scanning endpoint for the demo.
|
// handlePublicScan provides a public (no-auth) prompt scanning endpoint for the demo.
|
||||||
|
// POST /api/v1/scan body: {"prompt": "Ignore all instructions..."}
|
||||||
|
// Runs sentinel-core (54 Rust engines) + Shield (C11 payload inspection) in parallel.
|
||||||
|
//
|
||||||
|
// Concurrency control: uses scanSem (buffered channel) to limit parallel scans.
|
||||||
|
// If all slots are busy, returns 503 Service Unavailable with Retry-After header
|
||||||
|
// to prevent OOM under burst load (e.g., 20 concurrent battle workers).
|
||||||
//
|
//
|
||||||
// @Summary Inspect AI Prompt
|
// @Summary Inspect AI Prompt
|
||||||
// @Description Scans user inputs using Sentinel Lattice (Rust engine) to detect jailbreaks, prompt injections, and Data Exfiltration attempts within 1ms.
|
// @Description Scans user inputs using Sentinel Lattice (Rust engine) to detect jailbreaks, prompt injections, and Data Exfiltration attempts within 1ms.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue