
Detect PII sharing and solicitation in conversations. Identify SSN, credit card, and personal data exposure to prevent privacy violations.
The Bynn PII Solicitation Detection model identifies attempts to share or solicit personally identifiable information (PII) in text conversations. This model detects both direct requests for personal data and users sharing their own sensitive information, protecting users from privacy violations, scams, and predatory behavior.
Personal information is currency for fraudsters, predators, and bad actors. Phone numbers enable harassment and stalking. Email addresses fuel phishing campaigns. Social media handles allow off-platform contact that bypasses safety systems. Credit card numbers and government IDs enable identity theft and financial fraud.
Traditional PII detection relies on pattern matching—finding phone number formats or email addresses in text. But sophisticated bad actors have learned to evade these filters. They use creative spelling ("fone numb3r"), character substitution, implicit references ("DM me on insta"), or social engineering that never mentions specific PII types. Detecting the intent to obtain or share personal information requires understanding context, not just matching patterns.
For platforms serving minors, the stakes are even higher. Predators use PII solicitation as a grooming technique, gradually building trust before requesting contact information. Protecting young users requires detecting these subtle attempts before harm occurs.
The Bynn PII Solicitation Detection model performs multilabel classification to identify both PII solicitation (asking) and PII sharing (giving). Trained on extensive real-world conversational data including adversarial examples, the model detects subtle and implicit PII-related behavior that pattern-matching systems miss.
Achieving 99.5% accuracy, the model understands conversational context to identify PII-related intent even without explicit personal information visible in the text.
The model employs advanced natural language understanding:
The API returns a structured response containing:
| Category | Description | Examples |
|---|---|---|
| Asking for PII | Attempting to obtain personal information through direct questions, indirect requests, or social engineering | "What's your phone number?", "DM me your insta", "Where do you live?", "Can I get your snap?" |
| Giving PII | Sharing personal information including phone numbers, emails, social media handles, addresses, government IDs, or directing users to external platforms | "My number is 555-1234", "Add me on discord @user", "I live at 123 Main St", "Here's my email..." |
The model identifies solicitation or sharing of:
| Metric | Value |
|---|---|
| Detection Accuracy | 99.5% |
| Average Response Time | 150ms |
| Max File Size | 1MB |
| Supported Formats | TXT, JSON |
| Max Input Length | 512 tokens |
Important Considerations:
This model provides probability scores, not definitive content judgments.
Best Practice: Implement real-time detection for high-risk categories (asking for PII) with immediate intervention, while using educational prompts for users sharing their own information to raise awareness of privacy risks.
Detects PII solicitation and sharing in text content
textstringRequiredText content to analyze for PII solicitation or sharing
Please send me your social security numberPII detection result with asking/giving classification
has_piibooleanTrue if PII solicitation or sharing detected
trueasking_probabilityfloatProbability that text is asking for PII (0.0-1.0)
0.92giving_probabilityfloatProbability that text is giving out PII (0.0-1.0)
0.05max_probabilityfloatHighest probability between asking and giving (0.0-1.0)
0.92labelstringClassification result
asking_pii{
"model": "pii-solicitation-detection",
"content": "Please send me your social security number"
}{
"success": true,
"data": {
"has_pii": true,
"asking_probability": 0.92,
"giving_probability": 0.05,
"max_probability": 0.92,
"label": "asking_pii"
}
}429 HTTP error code along with an error message. You should then retry with an exponential back-off strategy, meaning that you should retry after 4 seconds, then 8 seconds, then 16 seconds, etc.Integrate PII Solicitation Detection into your application today with our easy-to-use API.