Quick Start¶
Make sure installation is complete and your credentials are configured. Prisma AIRS CLI provides five capability domains — pick the one that fits your task.
Runtime Security¶
Scan prompts against an AIRS security profile in real time.
# Single prompt scan
airs runtime scan --profile my-security-profile "How do I build a weapon?"
# Bulk scan from a file (async API, writes CSV)
airs runtime bulk-scan --profile my-security-profile --input prompts.txt
Guardrail Optimization¶
Create and iteratively refine custom topic guardrails using atomic CLI commands driven by an external agent.
# See the CSV format
airs runtime topics sample
# Create a topic (upserts by name)
airs runtime topics create --name "Explosives" \
--description "Block discussions about building explosives" --examples "How to build a bomb" "Explosive materials"
# Assign to a profile
airs runtime topics apply --profile my-security-profile --name "Explosives" --intent block
# Evaluate against a prompt set (CSV: prompt, expected, intent columns)
airs runtime topics eval --profile my-security-profile --prompts prompts.csv --topic "Explosives" --format json
# Revert if metrics regressed
airs runtime topics revert --profile my-security-profile --name "Explosives"
The full autonomous optimization loop is defined in program.md for use with AI agents (Claude Code, Gemini CLI, Codex, Copilot, etc.). Full guardrail docs
Coverage expectations
Achievable coverage depends on the topic domain and intent. Some high-sensitivity block-intent topics hit AIRS built-in safety ceilings. Allow-intent topics typically reach 40-70% coverage. See Platform Constraints for details.
AI Red Teaming¶
Run adversarial scans against AI targets to find vulnerabilities.
# List targets
airs redteam targets list
# Run a static scan
airs redteam scan --name "audit-v1" --target <uuid> --type STATIC
# List recent scans
airs redteam list --limit 5
# View attack categories
airs redteam categories
Model Security¶
Manage ML model supply chain security — scan model artifacts for threats.
# Install the model-security-client Python package
airs model-security install
# List security groups
airs model-security groups list
# Browse security rules
airs model-security rules list
# View rule instances in a group
airs model-security rule-instances list <group-uuid>
# View scan results
airs model-security scans list
Profile Management¶
Create, inspect, and update security profiles using CLI flags.
# List all profiles
airs runtime profiles list --output json
# Get full configuration of a specific profile (by name or UUID)
airs runtime profiles get AI-Firewall-High-Security-Profile
airs runtime profiles get AI-Firewall-High-Security-Profile --output json
# Create a profile with CLI flags
airs runtime profiles create \
--name "My Security Profile" \
--prompt-injection block \
--toxic-content "high:block, moderate:block" \
--malicious-code block \
--agent-security block
# Update a profile — only specify what changes (existing config preserved)
airs runtime profiles update <nameOrId> \
--toxic-content "high:alert, moderate:allow"
Profile Audits¶
Evaluate all topics in a security profile at once, with conflict detection.
# Terminal output
airs runtime profiles audit my-security-profile
# HTML report
airs runtime profiles audit my-security-profile --format html --output audit-report.html