Skip to main content

Qostodian Nexus by Qohash

Qohash is a pioneer of zero-copy data security, the only model designed to secure petabytes of unstructured data in large enterprises. Enterprises run dozens of AI models, copilots, and autonomous agents, all hungry for data. Qostodian Nexus is the single control layer that governs every interaction. It knows your data. It enforces your policies. It scales from prompt inspection to LLM output data governance, interrogating all agentic, human, SaaS and API interactions with one control plane and a consistent set of policies. Nexus scans prompts and responses using deterministic classification policies and LLM-as-a-judge checks, returning an explicit enforcement decision (ALLOW, LOG, REDACT or BLOCK).

info

Qostodian Nexus is not a public offering. To inquire about access, visit qohash.com.

Quick Start​

1. Deploy Qostodian Nexus​

Run Qostodian Nexus as a container with your policy config mounted:

docker run --rm \
-p 8800:8800 \
-v $(pwd)/nexus.yaml:/etc/nexus/config.yaml \
qohash/nexus:latest

Verify it's ready:

curl -i http://localhost:8800/health
# Expected: HTTP/1.1 200 OK
note

Additional deployment options are available. Contact Qohash for details.

2. Configure LiteLLM Proxy (config.yaml)​

Pre-call — block sensitive data before it reaches the model:

config.yaml (pre-call)
guardrails:
- guardrail_name: "qostodian-nexus-pre-call"
litellm_params:
guardrail: qostodian_nexus
api_base: http://nexus:8800
mode: "pre_call"
default_on: true

Post-call — redact or block sensitive data in model output before it reaches the caller:

config.yaml (post-call)
guardrails:
- guardrail_name: "qostodian-nexus-post-call"
litellm_params:
guardrail: qostodian_nexus
api_base: http://nexus:8800
mode: "post_call"
default_on: true

3. Start LiteLLM Gateway​

litellm --config config.yaml

4. Test Requests​

Send a prompt containing a credit card number (blocked by a BLOCK policy):

curl -i http://localhost:4000/v1/chat/completions \
-H "Content-Type: application/json" \
-H "Authorization: Bearer <your_litellm_key>" \
-d '{
"model": "gpt-4o-mini",
"messages": [
{"role": "user", "content": "MASTERCARD 5555555555554444 03/2027 123"}
],
"guardrails": ["qostodian-nexus-pre-call"]
}'

Expected: Qostodian Nexus returns BLOCK → LiteLLM returns an error, no provider request is made.

Decisions​

Qostodian Nexus returns one decision per request:

DecisionRequest continues?Description
ALLOWYesNo policy violation detected
LOGYesViolation logged; request proceeds with outcome metadata
REDACTYes (masked)Sensitive substrings replaced in the payload before forwarding
BLOCKNoRequest fails; no provider call is made (for pre-call)

Supported Parameters​

ParameterTypeDescription
guardrailstringMust be qostodian_nexus
api_basestringBase URL of your Qostodian Nexus instance (e.g. http://nexus:8800)
modestringpre_call (scan prompt) or post_call (scan model output)
default_onbooleanApply this guardrail to all requests by default

No API key is required for LiteLLM to call Qostodian Nexus. As Qostodian Nexus is designed to be deployed within your infrastructure, you must secure it using network controls.

Request Identifiers​

Qostodian Nexus requires correlation identifiers on every request. These identifiers are never used to access content, they carry only metadata that attributes detections to the right user, session, and context.

Pass them via request headers:

curl -i http://localhost:4000/v1/chat/completions \
-H "Content-Type: application/json" \
-H "Authorization: Bearer <your_litellm_key>" \
-H "x-qostodian-nexus-identifiers-trace: trace-id" \
-H "x-qostodian-nexus-identifiers-source: source-id" \
-H "x-qostodian-nexus-identifiers-container: container-id" \
-H "x-qostodian-nexus-identifiers-identity: identity@example.com" \
-d '{
"model": "gpt-4o-mini",
"messages": [
{"role": "user", "content": "..."}
],
"guardrails": ["qostodian-nexus-pre-call", "qostodian-nexus-post-call"]
}'
IdentifierDescription
traceUnique ID for the request or session, used for correlation across events
sourceThe application or integration sending the request (e.g. app ID, service name)
containerThe conversation or thread context (e.g. conversation ID)
identityThe end-user identity (e.g. email or UPN), used for user-level attribution

These fields are required in all deployment modes. Their effect depends on the operating mode:

Qostodian Platform​

Qostodian is the Qohash data security posture management (DSPM) platform. It monitors high-risk unstructured data across your organization, providing visibility into sensitive data exposure, behavioral analytics, and governance workflows. When Qostodian Nexus operates in connected or advanced mode, identifiers are forwarded to Qostodian to correlate AI detections with broader data security activity across users, sessions, and applications.

ModeEffect
Basic standaloneIdentifiers appear in structured log output for traceability
Basic connectedConnects to the Qostodian Platform — identifiers are used for display and attribution
Advanced (platform)Connects to the Qostodian Platform — identifiers unlock full DSPM capabilities: activity correlation, behavioral profiling, and governance workflows

Security Guidance​

Qostodian Nexus operates on a zero-copy, data-sovereign processing model in all deployment modes: content is analyzed in-memory and never persisted or transmitted to Qohash. Only metadata (detection outcomes, policy decisions, identifiers) is reported — prompt and response content stays within your infrastructure at all times.

  • Use TLS between LiteLLM and Qostodian Nexus in production environments
  • Authenticate calls using mTLS (preferred) or bearer token
  • Deploy Qostodian Nexus in customer-controlled infrastructure (on-premises or cloud tenant) to ensure data stays within your security boundary