CyborgDB Hackathon 2025

611 Registered Allowed team size: 1 - 4
611 Registered Allowed team size: 1 - 4
idea phase
Online
starts on:
Oct 28, 2025, 12:30 PM UTC (UTC)
ends on:
Nov 23, 2025, 06:25 PM UTC (UTC)
hackathon
Online
starts on:
Nov 27, 2025, 03:30 AM UTC (UTC)
ends on:
Dec 20, 2025, 06:29 PM UTC (UTC)

Overview

OVERVIEW

Build AI Solutions Impervious To Vector Inversion Using CyborgDB’s Encrypted Vector Search

Vector databases are the backbone of modern AI — powering everything from RAG systems and semantic search to fraud detection. But with great power comes a huge risk: embeddings are fully invertible.

That means if a database is breached, the original data can be reconstructed — from sensitive medical records and financial transactions to proprietary code.

In this hackathon, we’re challenging innovators like you to build AI applications that handle sensitive data without the vulnerability to vector inversion that kills most AI projects in legal review. Your illustration of vector encryption employed in real world scenarios could help define the next generation of secure AI systems.

Build with embeddings that stay encrypted in use. Create interesting AI solutions that could actually be deployed in production scenarios without the data security risks! Win prizes. 

We’ve built encryption-in-use for vector search — delivering sub-millisecond encrypted queries at billion-vector scale. So far, it’s only been tested internally. Now, we need your expertise to prove its utility and push it further.

Whether you’re:

  • Building RAG systems for healthcare, fintech, or enterprise — help us uncover integration edge cases.
  • Doing real-time fraud detection — stress-test our latency claims.
  • Integrating with LangChain or LlamaIndex — find the rough edges we missed.
  • Deploying on Kubernetes or serverless — challenge our assumptions.

Task

Your challenge is to employ CyborgDB's encrypted vector database using the given themes and provide actionable feedback that helps us refine the product.

  • Put the database through Deploy the database for your realistic workflows, illustrate its utilityillustrate its utility, and uncover edge cases that reveal where improvements are needed.
  • Goal: Deliver practical, actionable insights that directly shape the future of secure vector search.

Your feedback is as valuable as your code.

Themes

Open Innovation

Build with Encrypted Vector Search

The Opportunity

Most AI applications handle sensitive data, but standard vector databases force you to choose between security and performance. CyborgDB eliminates that trade-off.

Your mission: Build any AI application that handles data too sensitive for plaintext vector storage. The more critical the security requirement, the better.

What we're looking for:

  • Applications where a data breach would have catastrophic business impact
  • Use cases currently blocked by security/compliance teams
  • Solutions that unlock revenue enterprises can't capture today
  • Integration patterns that stress-test our proxy in unexpected ways

Getting started: Check out example notebooks and integration templates at cyborgdb.co/templates

Example Use Cases

  • Multi-tenant B2B SaaS: Document search or recommendations where customers demand cryptographic isolation
  • Legal tech: Attorney-client privileged communications, M&A due diligence, contract analysis
  • HR/recruiting: Candidate matching that doesn't expose salary history or performance reviews
  • Supply chain: Optimization using encrypted vendor pricing and contract terms
  • E-commerce: Privacy-preserving recommendation engines that can't reconstruct user behavior
  • Government: Intelligence analysis, citizen services, inter-agency data sharing

SubTask: CyborgDB Evaluation

  • Test CyborgDB in your local system and integrate with your application
  • Document any failures or unexpected behaviors and explain why they occur
  • Share performance metrics (query latency, throughput, etc.) at the scale of your experiment
  • Identify missing features or limitations that could impact real-world deployment

Choose your own application or propose something different—what matters is demonstrating the value of encrypted vector search for sensitive data.

Health Care

Secure Medical AI with Encrypted Vector Search

You have creative freedom on the application. Build any medical AI app that demonstrates encrypted vector search value. The example below is ONE path—not the only path. We want to see what problems YOU think need solving with this tech stack.

Getting started: Check out example notebooks and integration templates at cyborgdb.co/templates

Example Application: HIPAA-Compliant Medical Chatbot

Overview:
Build a secure medical chatbot that answers clinical questions using patient records. Collect and clean EHR/FHIR data while removing or masking PHI. Convert the records into embeddings with a local or private LLM and store them encrypted in CyborgDB. When a clinician asks a question, the system retrieves relevant encrypted embeddings, decrypts them in memory, and generates safe responses. Access controls and logging ensure HIPAA compliance.

Example Tasks

1. Data Pipeline Setup:
Collect and clean medical records while masking or removing PHI before processing.

2. Embedding Generation:
Create encrypted medical text embeddings using a private or local LLM model.

3. Encrypted Storage in CyborgDB:
Store all embeddings and metadata securely in CyborgDB with full encryption.

SubTask: CyborgDB Evaluation

  • Test CyborgDB in your local system and integrate CyborgDB and vectors.
  • Document any failures or unexpected behaviors and explain why they occur.
  • Share performance metrics (query latency, throughput, etc.) at the scale of your experiment.
  • Identify missing features or limitations that could impact real-world deployment in clinical settings.

4. Chatbot Retrieval Workflow:
Retrieve encrypted context from CyborgDB and use it to generate safe, clinical responses.

5. Access Control & Auditing:
Implement secure authentication, logging, and audit trails to meet HIPAA standards.

Other Example Applications

  • Clinical decision support querying patient histories without exposing PHI
  • Medical literature search for researchers handling sensitive trial data
  • Symptom checker that can't reconstruct patient information from embeddings
  • Insurance claims assistant that protects member data
  • Drug interaction checker using encrypted patient medication histories

Choose your own application or propose something different—what matters is demonstrating secure vector search for sensitive medical data.

FinTech

Fintech Security with Encrypted Vector Search

You have creative freedom on the application. Build any fintech application that demonstrates encrypted vector search for sensitive financial data. The example below is ONE path—not the only path. We want to see what problems YOU think need solving with this tech stack.

Getting started: Check out example notebooks and integration templates at cyborgdb.co/templates

Example Application: Real-Time Fraud Detection System

Overview:
Create a real-time fraud detection system that keeps customer financial data encrypted. Transactions are converted into embeddings, stored securely in CyborgDB, and compared against past patterns to detect suspicious activity. The system retrains regularly to improve accuracy and sends alerts to analysts, with all actions logged securely for auditing.

Example Tasks

1. Feature Extraction:
Convert streaming financial transactions into numerical or embedding vectors in real time.

2. Encrypted Indexing:
Insert these embeddings into CyborgDB, ensuring all data remains encrypted end-to-end.

SubTask: CyborgDB Evaluation

  • Integrate CyborgDB as your vector store.
  • Document any failures or unexpected behaviors and provide reasoning.
  • Share performance metrics (query latency, throughput, etc.) at the scale of your test.
  • Identify missing features or limitations that could affect real-world fraud detection deployment.

3. Fraud Detection API:
Query CyborgDB for similar patterns to detect suspicious or repeated fraud behaviors.

4. Model Feedback Loop:
Continuously retrain models as new fraud data is collected to reduce false positives.

5. Alert & Review System:
Send high-risk alerts to analysts with secure, encrypted audit logs for traceability.

Other Fintech Applications

  • Transaction anomaly detection that can't leak customer financial history
  • Account takeover prevention using encrypted behavioral patterns
  • Money laundering detection across encrypted customer profiles
  • Credit risk modeling that protects borrower financial data
  • Investment research platforms with encrypted client portfolio data
  • KYC/AML screening that maintains customer privacy
  • Payment routing optimization using encrypted transaction patterns

Choose your own application or propose something different—what matters is demonstrating secure vector search for sensitive financial data.

Prizes USD 10000 in prizes

Main Prizes
Phase 1: Idea Awards - $1,500
USD 1500

Best Healthcare Use Case – $500 Best FinTech Use Case – $500 Most Creative Enterprise Use Case – $500

Phase 2: Prototype Awards - $8,500
USD 8500

Grand Prize (Best Overall): $3,500 Best Healthcare Implementation: $1,500 Best FinTech Implementation: $1,500 Best Enterprise Implementation: $1,000 Best Technical Feedback & Documentation: $1,000

Non-Monetary Incentives (All Prototype Completers)

3-month CyborgDB Enterprise trial ($2,500 value) Direct Slack access to CyborgDB engineering team Featured case study opportunity (with consent) Early access to roadmap features

starts on:
Oct 28, 2025, 12:30 PM UTC (UTC)
closes on:
Nov 23, 2025, 06:25 PM UTC (UTC)

Social Share

Help & Support

Please contact event admin
HackerEarth Support at support@hackerearth.com
Notifications
View All Notifications

?