This page replaces the older native CrowdStrike/Pangea integration flow. The recommended approach is now to use Custom Guardrails with a thin adapter service that calls CrowdStrike AIDR.
CrowdStrike AIDR endpoint used
- Base URL:
https://api.crowdstrike.com/aidr/aiguard - Guard endpoint:
POST /v1/guard_chat_completions - Reference: CrowdStrike AIDR Guard LLM Chat Completions
result.blocked- whether the content should be blockedresult.transformed- whether content was transformed/redactedresult.guard_output- transformed structured output (when available)result.detectors- detector-level findings
Integration architecture
TrueFoundry Custom Guardrails expect TrueFoundry request/response schemas. CrowdStrike expectsguard_input payloads.So the recommended pattern is:
- TrueFoundry AI Gateway calls your Custom Guardrail adapter
- Adapter maps payload to CrowdStrike
guard_chat_completions - Adapter maps CrowdStrike verdict back to TrueFoundry allow/block/mutate behavior
Prerequisites
Before you begin, ensure you have:- A CrowdStrike account with AIDR access
- A CrowdStrike bearer token with permission to call AIDR APIs
- TrueFoundry AI Gateway access with permission to configure guardrails
- A deployed adapter service endpoint reachable by the Gateway
Quick start
Build and deploy the adapter service
Create two endpoints in your adapter:
POST /crowdstrike/inputfor LLM input guardrailsPOST /crowdstrike/outputfor LLM output guardrails
- Read incoming TrueFoundry payload
- Build CrowdStrike payload under
guard_input(especiallymessages) - Call
POST https://api.crowdstrike.com/aidr/aiguard/v1/guard_chat_completions - Return block/mutate/pass behavior to TrueFoundry
Keep the CrowdStrike token in your adapter environment (not in client code).
In TrueFoundry, authenticate only to your adapter endpoint.
In TrueFoundry, authenticate only to your adapter endpoint.
Register Custom Guardrail integrations in TrueFoundry
Navigate to AI Gateway → Controls → Guardrails and create a guardrail group.Add two custom integrations:
For details on the Custom Guardrail request/response schema and authentication options, see the Custom Guardrails guide.
| Integration | URL | Target | Operation | Enforcing Strategy |
|---|---|---|---|---|
| Input | https://<your-adapter>/crowdstrike/input | request | validate (or mutate) | enforce |
| Output | https://<your-adapter>/crowdstrike/output | response | validate (or mutate) | enforce |
Validation logic
Your adapter should map CrowdStrike response to TrueFoundry behavior:- If
result.blocked == true-> return HTTP 400 (request blocked) - If
result.transformed == trueand operation ismutate-> return transformed payload - Otherwise -> return pass (no change)
Example CrowdStrike response shape
Testing checklist
- Safe prompt should pass.
- Prompt-injection prompt should return blocked response.
- Sensitive data prompt should block or redact based on adapter behavior.
- Verify guardrail traces in TrueFoundry request logs.
Troubleshooting
Requests time out
Requests time out
Ensure your adapter timeout is below TrueFoundry guardrail timeout and optimize the payload sent to CrowdStrike.
Output guardrails not triggering
Output guardrails not triggering
Confirm output integration is configured with
target: response and bound under llm_output_guardrails.Transformations are ignored
Transformations are ignored
Use
operation: mutate and return transformed payload from your adapter.