API Innovate 2026 - Cybersecurity - Web

Suraksha Sathi

Paste a suspicious message, email, offer, OTP request, or payment link. The app uses ASI-1 twice: first to extract a structured threat report, then to turn that report into plain-language next steps.

Structured ASI-1 Analysis India-Focused Scam Signals Action Plan In Seconds

Analyze Content

Waiting for input.

Checking server configuration...

Risk Report

No analysis yet
Risk Score --
Attack Type --
Confidence --

Summary

Run an analysis to see the verdict and supporting evidence.

Evidence

  • Signals will appear here.

Immediate Actions

  • Recommended actions will appear here.

Possible Data Exposure

  • Exposure risks will appear here.

Language Signals

  • Language indicators will appear here.

ASI-1 Guidance

Second pass reasoning
The response will convert the structured report into a shareable action plan.

Why This Fits The Hackathon

Meaningful ASI-1 Usage

The app does more than generic chat. It uses schema-constrained extraction for a machine-readable scam report and then uses that report as context for a second ASI-1 reasoning pass.

Built For Bharat

The prompts are tuned for UPI fraud, KYC scams, parcel scams, fake job messages, and impersonation patterns that affect Indian users every day.

Submission Ready

Single-command run, no external frontend framework, clear README, and an obvious ASI-1 integration path for judges to inspect in the source.