D1 Input boundary
GapScope, allowed sources, abuse controls, and prompt injection boundaries.
- How are allowed inputs, sources, and operating scope enforced?
- What prompt-injection and untrusted-content controls are documented?
Convert vendor claims, product notes, integrations, and data flows into PSF-aligned procurement questions. Useful before approval, pilot, renewal, or client recommendation.
This is an evidence-request generator, not an approval. Use it before procurement or a client engagement to identify the questions a vendor must answer.
Scope, allowed sources, abuse controls, and prompt injection boundaries.
Contracts, schemas, refusals, confidence thresholds, and failure paths.
Classification, minimisation, retention, redaction, and vendor data access.
Traces, evals, incidents, drift, operational review, and production metrics.
Versioning, release gates, canaries, rollbacks, and reproducibility.
Autonomy limits, approvals, escalations, overrides, and audit trails.
Tool permissions, secrets, agent threat testing, and integration risk.
Provider fallbacks, dependency inventory, portability, and degraded modes.