Implement the following (reusing and extending techniques from Capstone 1 where applicable): - Input validation and sanitization. - Prompt injection detection. - PII detection and redaction. - Toxicity filtering on outputs. - Topic boundary enforcement (keep responses within the application's domain