Blog

LLM security, governance, and
production AI patterns.

Technical writing from the Autrace engineering team.

CompliancePII

PII in AI Pipelines: The Hidden Compliance Risk in Every LLM Call

When users send messages to your AI assistant, they include credit card numbers, passport details, and health information far more often than you'd expect. Here's what the data shows and how to handle it.

April 8, 2026·6 min read
ArchitectureZero-Trust

Zero-Trust Architecture for LLM Deployments

Zero-trust means "never trust, always verify" - but most LLM deployments implicitly trust everything in the prompt. This post maps zero-trust principles onto the LLM request lifecycle.

April 1, 2026·10 min read
AuditCompliance

Why LLM Audit Trails Need Cryptographic Chaining (Not Just Logs)

An append-only log is better than nothing. A cryptographically chained audit trail is what regulated environments actually need. The difference - and how to build it.

March 24, 2026·7 min read
OWASPSecurity

OWASP LLM Top 10 Explained: What Each Risk Means in Practice

The OWASP LLM Top 10 list exists. Far fewer teams have mapped their architecture against it. This post walks through each of the 10 risks with concrete examples from real application patterns.

March 17, 2026·12 min read
CostRouting

Model Routing: Using the Cheapest Model That Actually Solves the Task

Not every LLM call needs GPT-4. A routing layer that sends classification tasks to Haiku and complex reasoning to Sonnet can cut LLM costs by 60-80% with no quality degradation.

March 10, 2026·9 min read