๐Ÿ“… let's chat! explore the endless possibilities creating industries that don't exist. click here

mistral-data-handling

Implement Mistral AI PII handling, data retention, and GDPR/CCPA compliance patterns. Use when handling sensitive data, implementing data redaction, configuring retention policies, or ensuring compliance with privacy regulations for Mistral AI integrations. Trigger with phrases like "mistral data", "mistral PII", "mistral GDPR", "mistral data retention", "mistral privacy", "mistral CCPA". allowed-tools: Read, Write, Edit version: 1.0.0 license: MIT author: Jeremy Longshore <jeremy@intentsolutions.io>

Allowed Tools

No tools specified

Provided by Plugin

mistral-pack

Claude Code skill pack for Mistral AI (24 skills)

saas packs v1.0.0
View Plugin

Installation

This skill is included in the mistral-pack plugin:

/plugin install mistral-pack@claude-code-plugins-plus

Click to copy

Instructions

# Mistral AI Data Handling ## Overview Handle sensitive data correctly when integrating with Mistral AI, ensuring privacy compliance. ## Prerequisites - Understanding of GDPR/CCPA requirements - Mistral AI SDK installed - Database for audit logging - Understanding of Mistral's data handling policies ## Mistral AI Data Policies **Key Points:** - Mistral AI does NOT use customer data for training (by default) - API data is retained for 30 days for abuse monitoring - Enterprise plans offer data processing agreements (DPAs) - Check current policies at docs.mistral.ai ## Instructions ### Step 1: Data Classification | Category | Examples | Handling | |----------|----------|----------| | PII | Email, name, phone, SSN | Redact before sending | | Sensitive | Medical, financial | Anonymize or don't send | | Credentials | API keys, passwords | NEVER send | | Business | Internal data | Consider anonymization | | Public | Product names, general info | Safe to send | ### Step 2: PII Detection ```typescript interface PIIMatch { type: string; match: string; start: number; end: number; } const PII_PATTERNS: Array<{ type: string; regex: RegExp }> = [ { type: 'email', regex: /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g }, { type: 'phone', regex: /\b(\+?1[-.]?)?\(?\d{3}\)?[-.\s]?\d{3}[-.\s]?\d{4}\b/g }, { type: 'ssn', regex: /\b\d{3}-\d{2}-\d{4}\b/g }, { type: 'credit_card', regex: /\b\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}\b/g }, { type: 'ip_address', regex: /\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b/g }, { type: 'date_of_birth', regex: /\b(0[1-9]|1[0-2])[\/\-](0[1-9]|[12]\d|3[01])[\/\-](19|20)\d{2}\b/g }, ]; function detectPII(text: string): PIIMatch[] { const findings: PIIMatch[] = []; for (const { type, regex } of PII_PATTERNS) { // Reset regex state regex.lastIndex = 0; let match; while ((match = regex.exec(text)) !== null) { findings.push({ type, match: match[0], start: match.index, end: match.index + match[0].length, }); } } return findings; } // Usage const text = 'Contact John at john@example.com or 555-123-4567'; const pii = detectPII(text); console.log(pii); // [{ type: 'email', match: 'john@example.com', ... }, { type: 'phone', match: '555-123-4567', ... }] ``` ### Step 3: Data Redaction ```typescript function redactPII(text: string, replacement = '[REDACTED]'): string { let redacted = text; for (const { regex } of PII_PATTERNS) { regex.lastIndex = 0; redacted = redacted.replace(regex, replacement); } return redacted; } function redactWithPlaceholders(text: string): { redacted: string; mapping: Map } { const mapping = new Map(); let redacted = text; let counter = 0; for (const { type, regex } of PII_PATTERNS) { regex.lastIndex = 0; redacted = redacted.replace(regex, (match) => { const placeholder = `[${type.toUpperCase()}_${++counter}]`; mapping.set(placeholder, match); return placeholder; }); } return { redacted, mapping }; } // Usage const input = 'Send report to john@example.com and jane@company.org'; const { redacted, mapping } = redactWithPlaceholders(input); console.log(redacted); // 'Send report to [EMAIL_1] and [EMAIL_2]' ``` ### Step 4: Pre-Request Validation ```typescript interface ValidationResult { safe: boolean; warnings: string[]; piiFound: PIIMatch[]; } function validateBeforeSending(messages: Array<{ role: string; content: string }>): ValidationResult { const warnings: string[] = []; const allPII: PIIMatch[] = []; for (const message of messages) { const pii = detectPII(message.content); allPII.push(...pii); } // Group by type const piiByType = allPII.reduce((acc, p) => { acc[p.type] = (acc[p.type] || 0) + 1; return acc; }, {} as Record); if (allPII.length > 0) { const typeList = Object.entries(piiByType) .map(([type, count]) => `${count} ${type}(s)`) .join(', '); warnings.push(`PII detected: ${typeList}`); } return { safe: allPII.length === 0, warnings, piiFound: allPII, }; } // Middleware async function safeChat( client: Mistral, messages: Array<{ role: string; content: string }>, options?: { allowPII?: boolean; autoRedact?: boolean } ): Promise { const validation = validateBeforeSending(messages); if (!validation.safe) { if (options?.autoRedact) { // Auto-redact PII messages = messages.map(m => ({ ...m, content: redactPII(m.content), })); } else if (!options?.allowPII) { throw new Error(`PII detected in request: ${validation.warnings.join(', ')}`); } } const response = await client.chat.complete({ model: 'mistral-small-latest', messages, }); return response.choices?.[0]?.message?.content ?? ''; } ``` ### Step 5: Audit Logging ```typescript interface AuditLog { timestamp: Date; requestId: string; userId?: string; operation: string; model: string; inputTokens: number; outputTokens: number; piiDetected: boolean; piiTypes: string[]; redacted: boolean; } class MistralAuditLogger { private logs: AuditLog[] = []; async log(entry: Omit): Promise { const log: AuditLog = { ...entry, timestamp: new Date(), }; // Store in database await db.auditLogs.insert(log); // Console log for immediate visibility console.log('[AUDIT]', JSON.stringify(log)); } async getLogsForUser(userId: string, days = 30): Promise { const cutoff = new Date(); cutoff.setDate(cutoff.getDate() - days); return db.auditLogs.find({ userId, timestamp: { $gte: cutoff }, }); } } ``` ### Step 6: GDPR Data Subject Requests ```typescript // Right to Access (DSAR) async function exportUserData(userId: string): Promise<{ auditLogs: AuditLog[]; exportedAt: string; }> { const auditLogs = await auditLogger.getLogsForUser(userId); return { auditLogs: auditLogs.map(log => ({ ...log, // Don't include actual content, just metadata })), exportedAt: new Date().toISOString(), }; } // Right to Erasure async function deleteUserData(userId: string): Promise<{ success: boolean; deletedCount: number; }> { // 1. Delete audit logs older than legal retention period const result = await db.auditLogs.deleteMany({ userId, timestamp: { $lt: new Date(Date.now() - 7 * 365 * 24 * 60 * 60 * 1000) }, // Keep 7 years for compliance }); // 2. Anonymize remaining logs await db.auditLogs.updateMany( { userId }, { $set: { userId: '[DELETED]' } } ); // 3. Record deletion for compliance await db.deletionLog.insert({ userId, deletedAt: new Date(), recordsAffected: result.deletedCount, }); return { success: true, deletedCount: result.deletedCount, }; } ``` ### Step 7: Data Retention Policy ```typescript interface RetentionPolicy { dataType: string; retentionDays: number; reason: string; } const RETENTION_POLICIES: RetentionPolicy[] = [ { dataType: 'audit_logs', retentionDays: 90, reason: 'Operational debugging' }, { dataType: 'error_logs', retentionDays: 30, reason: 'Error tracking' }, { dataType: 'compliance_logs', retentionDays: 2555, reason: 'Legal requirement (7 years)' }, ]; async function enforceRetention(): Promise { for (const policy of RETENTION_POLICIES) { const cutoff = new Date(); cutoff.setDate(cutoff.getDate() - policy.retentionDays); const result = await db.collection(policy.dataType).deleteMany({ createdAt: { $lt: cutoff }, }); console.log(`Cleaned ${result.deletedCount} records from ${policy.dataType}`); } } // Run daily // cron.schedule('0 3 * * *', enforceRetention); ``` ## Output - PII detection implemented - Data redaction active - Audit logging enabled - GDPR compliance procedures in place ## Error Handling | Issue | Cause | Solution | |-------|-------|----------| | PII in logs | Missing redaction | Apply logging middleware | | Deletion failed | Locked records | Check foreign key constraints | | False positives | Overly broad regex | Tune PII patterns | | Audit gaps | Async failures | Add retry logic | ## Examples ### Safe Chat Wrapper ```typescript const response = await safeChat(client, messages, { autoRedact: true }); ``` ### Quick PII Check ```typescript const hasPII = detectPII(userInput).length > 0; if (hasPII) { console.warn('PII detected in user input'); } ``` ## Resources - [GDPR Developer Guide](https://gdpr.eu/developers/) - [CCPA Compliance Guide](https://oag.ca.gov/privacy/ccpa) - [Mistral AI Privacy Policy](https://mistral.ai/privacy/) ## Next Steps For enterprise access control, see `mistral-enterprise-rbac`.

Skill file: plugins/saas-packs/mistral-pack/skills/mistral-data-handling/SKILL.md