E-commerce Assistants
How a large retailer protected shopping assistants from price manipulation and brand risk.Challenge
An AI shopping assistant handled:- Product discovery and recommendations
- Order status and returns
- Promotion and pricing guidance
Solution
KoreShield scanned user inputs and retrieved product content before the model saw it. High-risk actions were limited to verified flows.RAG Safety Pipeline
Product reviews, Q&A, and catalog content were scanned before being added to the prompt:Risk Controls
Promotion Guardrails
Restricted discount and pricing responses to prevent coupon abuse
RAG Filtering
Sanitized product reviews and Q&A content before retrieval
Brand Policy Rules
Blocked disallowed claims and guarantees
Fraud Signals
Flagged suspicious sequences for review
Implementation Example
- Review Scanning
- Pricing Protection
- Recommendation Safety
Checkout and Returns Protection
Verified Checkout Flows
Verified Checkout Flows
Checkout actions required signed sessions and verification:
Refund Safety
Refund Safety
Returns and refunds validated against policy:
Sensitive Topics
Sensitive Topics
Medical or regulated products routed to human review:
Results
Reduced Abuse
Prevented abuse of promotional flows and coupon stacking
Safe Recommendations
Blocked review-based prompt injection in recommendations
Brand Compliance
Improved compliance with brand and legal constraints
Attack Scenarios Prevented
- Price Manipulation
- Review Injection
- Coupon Abuse
Blocked Attack:KoreShield Action:
- Detected prompt injection attempt
- Blocked request before reaching LLM
- Logged security event
- Returned safe response
Best Practices
E-commerce AI Safety Guidelines
- Sanitize user-generated content - Reviews, Q&A, and comments can contain injections
- Validate all pricing operations - Never trust AI with price calculations
- Use verified flows for transactions - Checkout requires authenticated sessions
- Monitor for patterns - Coupon abuse often follows predictable sequences
- Maintain brand voice - Block responses that violate brand guidelines
Monitoring Dashboard
Related Documentation
RAG Security
Secure retrieval pipelines
Security
Core security features
Monitoring
Alerts and dashboards