Assess in under 5 minutes whether the current RAG and vector pipeline could leak sensitive information or trust poisoned content.
This screen is for teams using knowledge bases, retrieval-enabled copilots, or internal assistants who need a governance answer before broader rollout or higher-sensitivity data access.

This page exists to classify the current posture quickly, surface the biggest gaps, and route the buyer to the correct paid implementation path without giving away the workbook or document layer.
It evaluates whether the current retrieval stack can defend source trust, data boundaries, leakage controls, takedown discipline, and investigation traceability.
It does not mean the retrieval system is broken. It means wider rollout should wait until trust boundaries, evidence, or review discipline are stronger.
The missing value is data handling policy, disclosure response procedure, evidence discipline, and formal impact review. That sits in ACT Tier 2.
The purpose of this screen is to classify posture quickly, highlight the biggest gaps, and route the organization to the correct next step without giving away the paid implementation layer.
It evaluates whether the current retrieval stack can defend source trust, data boundaries, leakage controls, takedown discipline, and investigation traceability.
It does not mean the retrieval system is broken. It means wider rollout should wait until trust boundaries, evidence, or review discipline are stronger.
The missing value is data handling policy, disclosure response procedure, evidence discipline, and formal impact review. That sits in ACT Tier 2.
Use the paid bridge when the screening result shows structural control gaps that need policy, procedure, evidence, lifecycle discipline, or implementation ownership rather than another free quiz.
Get the implementation documents, procedures, evidence assets, and governance pack this free screen intentionally does not generate.
Read the OWASP Top 10 For Large Language Model Applications guide to understand the underlying control themes and risk categories.
Read the governance guide for the policy, ownership, and control architecture behind this screen.
Read the incident-response guide for shutdown, logging, evidence, and escalation discipline.
Practical answers about RAG trust, vector-layer governance, and data-disclosure exposure.