AI Safety ~6 min read

AI Prompt Security: What You Should Never Share With an AI

AI assistants have become part of daily work: drafting emails, writing code, summarizing documents, generating passwords. They feel conversational and private, like thinking out loud. They aren't. What you type into an AI prompt can be stored for months or years, reviewed by employees, or used to improve future models. This article covers exactly what to keep out of your prompts and how to get the help you need without the risk.

What actually happens to your prompts

When you send a message to an AI assistant, it travels to a server operated by the AI company: OpenAI, Anthropic, Google, Meta, or whichever provider the product uses. What happens next depends on the company's data policy, which is often long, ambiguous, and subject to change.

In practice, your prompts may be:

Consumer vs. enterprise: Enterprise and API plans often have stronger privacy defaults than consumer chat products, but you still need to read the policy for your specific product. Don't assume enterprise protection if you're on a free or personal tier.

What you should never include in an AI prompt

These categories cover the most common and most damaging leaks.

What counts as PII context?

Readers often miss subtler identifiers. Beyond names and ID numbers, avoid including: your bank name, your employer's name, your email address or username, your city or location, client names, and account numbers of any kind. These details seem harmless individually. Combined, they create a profile.

The real leak is logs, files, and pasted code

Most credential leaks in AI prompts don't happen when someone intentionally shares a secret. They happen when someone pastes a log file, a config snippet, or a chunk of code that silently contains a key or token.

Before pasting anything into an AI, do three things:

The specific risk with AI password generation

AI-powered password generators, including the AI Mode on this site, are useful for creating memorable, context-specific passwords. But they introduce a network request that local generators don't: your text description is sent to a remote server.

The rule: describe what you need the password for in generic terms. Never include the actual password, your username, your account name, or the institution's name.

Bad prompt: "Generate a new password for my Chase bank account — my current one is BlueSky2024! and my username is [email protected]"

Good prompt: "Generate a strong, memorable password for a banking site — something I can type easily but wouldn't guess"

The good prompt gets you what you need. The bad prompt hands a third-party server your existing credentials, username, and institution. If you'd rather avoid the network request entirely, use Random or Passphrase mode. Both generate passwords entirely inside your browser with no data sent anywhere.

How to use AI safely

None of this means AI tools are unusable. They're genuinely powerful. It means applying the same discretion you'd use with any external service.

Quick checklist before you paste

Run through this before sending anything sensitive:

What to do instead

For anything involving real credentials or sensitive data, use tools that never leave your device.

Generate locally — Random or Passphrase mode No network request. Password never leaves your browser.
AI Mode safety rules Use generic descriptions only. Never include real credentials or account names.
Back to pwasecurity.org Generate a password locally