68% of breaches involve a human element — Verizon DBIR 2024

Your DLP misses the
most common data leak

Wrong file attachments cause more data incidents than phishing and malware combined. Intentify AI catches them in Slack before they leave.

Add to Slack — free See live demo ↓ 2-minute setup · Zero content retention · No credit card
intentify-ai — threat-monitor Live
$4.88M
avg. cost of a breach
68%
breaches: human element
#1
cause: wrong file sent
2 min
to deploy

Watch Intentify AI in action

Real scenarios, running live. Click any case or let them cycle automatically.

Wrong file — sales call"Here are the demo slides…" → Q1 financials
Blocked
Fake anonymization"Anonymized customer report" → raw PII inside
Blocked
Context violationRevenue forecast → #general (280 members)
Blocked
Slack Connect leakInternal roadmap → external partner channel
Blocked
API key in screenshotDebug screenshot → exposed AWS credentials
Blocked
Invoice — verified safeInvoice attached → #finance (private)
Safe ✓
Design asset — verified safeLogo variants → #design (internal)
Safe ✓
Google Drive link leak"Onboarding doc" → Google Sheet with salary data
Blocked
Pastebin with secrets"Config snippet" → API keys exposed on Pastebin
Blocked
intentify-ai — analysis
Here are the demo slides for tomorrow's sales call.
📄Q1_Financial_Results_FINAL.pdf
→ parsing intent: "demo slides for sales call"
→ extracting text from PDF…
→ content: Q1 revenue, EBITDA, margin figures
→ channel: #sales-team (semi-private, 12 members)
→ MISMATCH: financial report ≠ "demo slides"
🛑
File removedFinancial data doesn't match stated intent. DM sent to sender with re-send prompt.
Sharing the anonymized customer report for the board.
📊customer_report_anon_v2.xlsx
→ parsing intent: "anonymized customer report"
→ reading XLSX (3 sheets, 1,847 rows)…
→ PII detected: 1,847 email addresses
→ PII detected: customer names, phone numbers
→ MISMATCH: not anonymized — raw PII present
🛑
File removedSpreadsheet contains raw customer PII. Not anonymized as claimed.
Here's the updated revenue forecast for Q2.
📈revenue_forecast_q2_2025.xlsx
→ parsing intent: "revenue forecast Q2"
→ content verified: financial projections ✓
→ channel: #general (PUBLIC, 280 members)
→ sensitivity: CONFIDENTIAL financial data
→ CONTEXT VIOLATION: public audience
🛑
File removedConfidential financial data shared in a public channel with 280 members.
Hey team, here's the project status update for this sprint.
📝Product_Roadmap_H2_2025.pptx
→ parsing intent: "project status update"
→ content: internal roadmap, unreleased features
→ channel: #acme-project (Slack Connect)
→ external members: 3 (Acme Corp domain)
→ EXTERNAL LEAK: confidential to external
🛑
File removedInternal product roadmap shared in Slack Connect channel with 3 external partners.
Screenshot of the bug I'm seeing in prod — can someone help?
🖼️debug_screenshot_prod.png
→ parsing intent: "debug screenshot"
→ running AI vision analysis on image…
→ detected: AWS_ACCESS_KEY_ID visible in terminal
→ pre-scan: high-entropy token pattern matched
→ CRITICAL: credentials exposed in screenshot
🛑
File removedScreenshot contains AWS credentials. Rotate your keys immediately.
Invoice for March services attached.
🧾invoice_march_2025_acme.pdf
→ parsing intent: "invoice for March services"
→ extracting text from PDF…
→ content: invoice, amounts, line items ✓
→ channel: #finance (PRIVATE, 8 members) ✓
→ intent matches content, context appropriate ✓
Verified safeInvoice content matches description, shared in private finance channel.
New logo variants from the designer — v3 for review.
🖼️logo_v3_variants_final.png
→ parsing intent: "logo variants for review"
→ running AI vision analysis on image…
→ content: logo design variants, brand assets ✓
→ channel: #design (PRIVATE, 6 members) ✓
→ no sensitive content detected ✓
Verified safeImage shows logo design variants, shared in private design channel. No sensitive content.
Here's the onboarding doc for the new hire — please review.
🔗docs.google.com/spreadsheets/d/1BxiM…
→ parsing intent: "onboarding doc for new hire"
→ link detected: Google Sheets (spreadsheet)
→ URL path: /spreadsheets — likely salary/HR data
→ channel: #general (PUBLIC, 240 members)
→ MISMATCH: spreadsheet link in public channel
🛑
Link flaggedGoogle Sheets link shared in public channel — may expose sensitive HR or salary data to 240 members.
Sharing the config snippet I was talking about.
🔗pastebin.com/xK9mR2vT
→ parsing intent: "config snippet"
→ link type: Pastebin — high-risk (often secrets)
→ URL pattern: pastebin.com — public paste
→ channel: #engineering (24 members)
→ RISK: public paste may contain API keys/passwords
🛑
Link flaggedPastebin links are public and frequently contain exposed credentials. Verify the paste doesn't include secrets.
How it works

Three checks. Every file. Seconds.

💬

Intent

What the sender says the file is.

🔍

Content

What's actually inside — AI vision, text extraction, link analysis.

🌐

Context

Whether it's appropriate for the audience — channel size, external guests.

📤
File shared
Pre-scan
🧠
AI analysis
⚖️
Verdict
🛑
Blocked + DM

🔒 Zero content retention  ·  ✅ Fail-open — never blocks workflows  ·  🏢 Per-workspace isolation

vs Traditional DLP

The layer legacy tools can't provide

CapabilityIntentify AITraditional DLP
Setup time2 minutesDays to weeks
Intent vs content mismatch detection
AI vision for screenshots & images
Channel audience & Slack Connect awareness
Shared link detection (Drive, Dropbox, Pastebin…)
Content retained after analysisNeverStored
Pricing

Free to start. No per-seat fees.

Self-hosted. You only pay for your OpenAI API usage (~$0.002–$0.01 per scan).

Pro
Coming soon
Community + priority support, audit exports, compliance reports, custom policies.
Join waitlist

Interested in Intentify AI for your team?

Leave your details and we'll reach out within one business day. No sales pressure, no demo calls required.

  • Questions about deployment and self-hosting
  • Enterprise pricing and support SLA
  • Security review and compliance docs
  • Custom integration requirements

Stop leaks before they happen

One-click install. Protects your workspace in minutes. No sales call, no credit card.

Add to Slack — free Learn more →