Skip to main content
Detect prompt injection attacks in your application using the Centure API or SDK.

Using the Node.js SDK

1

Install the SDK

npm install @centure/node-sdk
2

Get your API key

Create an API key from the dashboard and set it as an environment variable:
export CENTURE_API_KEY="your-api-key"
3

Scan text content

import { CentureClient } from "@centure/node-sdk";

const client = new CentureClient();

// Fetch text from a URL and scan it
const text = await fetch('https://example.com').then(r => r.text());
const result = await client.scanText(text);

if (!result.is_safe) {
  console.log("Prompt injection detected!");
  console.log("Threats:", result.categories);
} else {
  console.log("Content is safe");
}
The SDK automatically reads the CENTURE_API_KEY environment variable if you don’t provide an API key explicitly.

Using the REST API

You can also call the API directly without using the SDK:
curl -X POST https://api.centure.ai/v1/prompt-injection/text \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"content": "Your text content here"}'

Response Format

All scan endpoints return the same response structure:
{
  "is_safe": false,
  "categories": [
    {
      "code": "context_injection",
      "confidence": "high"
    }
  ],
  "request_id": "req_abc123",
  "api_key_id": "key_xyz789",
  "request_units": 1,
  "service_tier": "standard"
}
  • is_safe: false when prompt injection is detected
  • categories: Array of detected threat types with confidence levels
  • request_id: Unique identifier for this request
See the Risk Classifications page for detailed explanations of threat categories.

Next Steps

Node.js SDK Documentation

Full SDK documentation with advanced features and MCP integration

API Reference

Complete REST API documentation and endpoint reference

Security Concepts

Learn about threat categories and risk classifications

npm Package

View the SDK on npm