What is Mirror?
Mirror is Continum’s async auditing system that captures every LLM interaction and validates it against compliance rules without adding latency to user responses.How Mirror Works
1. Compliance Triplet
After your LLM call completes, the SDK sends a “compliance triplet” to Continum:2. Audit Ingestion
The Platform validates and queues the audit:3. Compliance Processing
The Compliance Engine processes the audit:4. Signal Storage
The audit result (signal) is stored and appears in your dashboard:SDK Integration
Mirror is automatically enabled when using the Continum SDK:API Endpoint
POST /audit/ingest
Manually ingest a compliance triplet:What Gets Audited?
Mirror analyzes both the prompt and response for compliance issues:Prompt Analysis
- User input validation
- PII in user messages
- Prompt injection attempts
- Jailbreak patterns
Response Analysis
- PII leakage in LLM output
- Biased or discriminatory content
- Hallucinations and false information
- Security vulnerabilities in code
- Dangerous instructions
Metadata Analysis
- Token usage patterns
- Thinking block analysis (o1, o3, Claude Opus)
- Model behavior anomalies
Sandbox Types
Mirror uses sandbox configurations to determine what to check:Thinking Block Analysis
Mirror can analyze reasoning traces from advanced models:- Hidden jailbreak attempts
- Deceptive reasoning
- Adversarial optimization
Performance
Mirror is designed for high throughput:| Metric | Value | Notes |
|---|---|---|
| Ingestion latency | < 50ms | Platform ingestion |
| Processing time | 2-5s | Compliance analysis |
| Throughput | 1000+ req/s | Auto-scaling |
| User impact | 0ms | Fully asynchronous |
Error Handling
Mirror includes robust error handling:Retry Logic
- Automatic retries (3 attempts)
- Exponential backoff
- Failed audit tracking
Validation
- Sandbox must exist before ingestion
- API key must be valid
- Plan limits enforced (DEV: 1000 audits)
Monitoring
- Real-time metrics
- Queue depth monitoring
- Failed audit alerts
Privacy & Security
Data Handling
What Continum receives:- Prompt text
- Response text
- Metadata (tokens, model, provider)
- Audit ID
- Risk level (LOW, MEDIUM, HIGH, CRITICAL)
- Violation codes
- Redacted reasoning
- Timestamp and duration
- Your API keys (stay on your server)
- Raw PII (redacted in reasoning)
- User identifiers
Sandbox Isolation
Each audit runs in a fresh isolated environment:- No state persisted between audits
- No cross-contamination
- Stateless compliance checking
Compliance Triplet Structure
Best Practices
Sandbox Selection
Choose the right sandbox for your use case:Metadata Enrichment
Add custom metadata for better auditing:Error Handling
Handle ingestion errors gracefully:Monitoring
Dashboard Queries
Query signals in the dashboard:- Filter by risk level
- Filter by sandbox
- Filter by date range
- Filter by provider/model
- Export for compliance reports
Webhooks (Coming Soon)
Receive real-time alerts for high-risk signals:Next Steps
Sandbox
Configure sandbox types
Signal
Understand audit results
API Reference
Mirror API documentation
Dashboard
View signals in dashboard

