Your employees are already using AI tools. With Trinity Cyber discover which ones — in minutes.

This is the first in a series on AI governance and security.

Nearly four in five AI-savvy employees use unsanctioned tools at work (Microsoft, 2024). That means shadow AI is already on your network — tools your team adopted with good intentions but without your approval, potentially moving customer data, intellectual property, and source code through services you’ve never evaluated and can’t monitor.

And if your board asks what your AI exposure is today, the honest answer for most security teams is: we don’t know.

In addition to domain-level AI tool detections, our visibility goes further. Trinity Cyber’s SSE 3.0 includes Full Content Inspection™ — technology that automatically removes threats from your live traffic — plus full packet capture (PCAP), giving you the power to discover every shadow AI tool on your network, and see the data flowing through it.

Five questions your AI inventory must answer

If you can answer these five questions with data rather than assumptions, you’re ahead of most of your peers.

1. What AI tools are in use?

Go beyond ChatGPT — look for standalone genAI apps, embedded AI features in your existing SaaS stack, AI agents, and browser plug-ins.

2. How are they accessed?

Web UIs, direct API calls, browser extensions, SaaS-embedded features — each represents a different risk profile and a different enforcement point.

3. Who is using them?

Map usage to users, groups, devices, and business units so policy can be role-based, not one-size-fits-all.

4. How much data is flowing?

Track upload volume, prompt frequency, and file transfer patterns as proxies for exposure.

5. What’s the risk tier and decision?

For each tool: allow, allow with guardrails, or block — and document why.

Once you can answer these five questions with data rather than assumptions, you have the foundation for an enforceable AI usage policy — one grounded in what’s happening on your network.

Identifying Shadow AI in Your Organization portal-screenshot

A portion of Pack 1 in action: 9,420 sessions to core LLM services detected in the Trinity Cyber Portal’s Full Session (Advanced PCAP) Search.

AI Detection Packs for the Trinity Cyber Portal

Customers can visit the Trinity Cyber KnowledgeBase for the seven AI Detection Packs noted below. These detection packs let you harness the full power of PCAP searches to illuminate Shadow AI within your network traffic. Each pack searches both encrypted traffic and unencrypted traffic to ensure coverage regardless of how the AI service is accessed.

Seven packs, ordered from highest-signal to broadest coverage:

High confidence Medium confidence Broader — expect non-AI hits
Pack 1 - Core LLM Uls and APIs
ChatGPT, Claude, Gemini, Copilot, DeepSeek, and other major large language models — the highest-signal starting point.
Pack 2 - Hugging Face and hosted Al app ecosystems
Open-source model hubs, inference APIs, and MLOps platforms where employees deploy or test models. The *hf.space wildcard alone catches thousands of community-deployed AI apps.
Pack 3 - AI coding
IDE copilots, code-gen platforms, and AI pair-programming tools that may be ingesting your proprietary codebase.
Pack 4 - Creative Al: image, video, audio
Midjourney, Runway, ElevenLabs, and similar — media generation tools that often receive proprietary content as input prompts.
Pack 5 - Meeting Al and productivity Al
Transcription bots, AI writing assistants, and workflow automators — including tools that silently join calls and ingest meeting audio.
Pack 6 - Agent frameworks and browser extensions
LangChain, CrewAI, and dozens of browser-based AI sidebars that intercept page content and send it to third-party models.
Pack 7 - Features embedded in SaaS apps
Productivity apps like Notion, Canva, and Grammarly that have added AI features — useful as discovery signals, but treat as medium-confidence indicators since they also capture non-AI usage.

From visibility to policy — what comes next

Running these packs will likely surface AI usage you didn’t know existed — and that’s the point. A complete inventory transforms shadow AI from an unknown risk into a manageable one. With Trinity Cyber’s unique visibility, you’re seeing what actually crosses your network.