Paste your prompt, code snippet, or any text content into the input area. The tool accepts any language or format — plain text, code blocks, JSON, YAML, or structured prompts.
Select which security checks to run. All four categories are enabled by default: Prompt Injection detection, Secret Leak detection, Unsafe Instruction detection, and PII Exposure detection.
Optionally add custom regex patterns in the 'Custom' field if you need to detect proprietary formats or organization-specific markers.
Toggle 'Redact in output' if you want the output to automatically replace detected secrets/injections with [REDACTED] placeholders before using the text with an AI.
Press ⌘↵ (or click 'Scan') to run the security analysis. The scan runs instantly in your browser — no network requests are made.
Review the Findings tab for a detailed list of all detected issues, grouped by severity (critical/high/medium/low/info). Each finding shows line/column position, matched text, and remediation advice.
Switch to the Redacted tab to see the cleaned version of your input with sensitive data redacted, or the JSON tab for structured output suitable for automation and CI/CD integration.
Client-side processing — all scanning runs in your browser using JavaScript, ensuring zero data leakage and complete privacy. Your prompts never leave your machine.
OWASP LLM Top 10 coverage — detects LLM01 (Prompt Injection), LLM02 (Sensitive Info Disclosure), LLM03 (Insecure Output Handling), and LLM05 (Supply Chain) risk patterns.
Prompt injection detection — identifies role hijacking ('ignore previous instructions'), instruction override ('you are now', 'system override'), data exfiltration attempts, and delimiter abuse.
Secrets & credentials scanning — detects 30+ secret types including AWS access keys/secret keys, GitHub/GitLab tokens, API keys (OpenAI, Google, Anthropic), JWT tokens, Bearer tokens, RSA/EC/OPENSSH private keys, and database connection strings with credentials.
PII exposure detection — automatically finds email addresses, public IP addresses, phone numbers, and credit card numbers (Luhn-validated) in your input.
Unsafe instruction detection — flags tool-call injection markers ([TOOL_CALL], <function>), XML/HTML tag injection, markdown exfiltration attacks, and data URL smuggling.
Risk scoring algorithm — weighted severity scoring (critical=25, high=15, medium=8, low=3, info=1) produces a 0-100 risk score with clear safety classification (safe/low/medium/high/critical).
Automatic redaction — replace all detected findings with [REDACTED:category] placeholders to produce AI-safe output ready for prompt injection protection.
Custom regex patterns — add your own patterns to detect proprietary key formats, internal document markers, or organization-specific sensitive data types.
Multi-output formats: Findings list with expandable details, redacted text view, and raw structured JSON for programmatic consumption or API integration.
Line-accurate reporting — each finding includes exact line and column positions, matched text snippet, severity color-coding, and actionable remediation recommendations.
Keyboard shortcuts: ⌘↵ to scan, ⌘⇧C to copy redacted output, ⌘⇧K to clear input — all customizable via the standard DevFlow shortcuts system.
URL state persistence — selected options are stored in URL query parameters, allowing you to share configured scans with teammates.
LocalStorage persistence — your input is auto-saved to browser storage and restored on page reload, preventing accidental data loss.
Zero configuration — works immediately without accounts, API keys, or setup. No external dependencies; all pattern libraries are bundled client-side.
Free forever — part of DevFlow's free developer tools suite, with no usage limits, no subscriptions, and no telemetry.