Dify
Security Scanner
Open-source LLM app development platform with visual workflow builder.
What Inkog Detects in Dify
Dify-specific vulnerability patterns that traditional security tools miss.
Workflow Loop Detection
CRITICALDify workflows with circular connections can create infinite execution loops.
Credential Exposure
CRITICALAPI keys and tokens embedded in Dify workflow configurations can be exposed.
Agent Node Analysis
HIGHAI agent nodes in Dify workflows without proper bounds can consume excessive resources.
Missing Authorization
HIGHDify workflow actions without user permission checks can perform unauthorized operations.
Dify Analysis Features
- Loop node detection
- Iteration analysis
- Workflow validation
- Plugin security checks
Get Started
Scan your Dify application in seconds.
Run the scanner
inkog scan ./workflows --framework difyReview findings
Inkog traces data flow through your Dify code and reports vulnerabilities with severity levels and line numbers.
Fix and verify
Apply the suggested fixes based on severity and re-scan to verify.
Dify Compliance Reports
Automated mapping to global AI governance frameworks.
EU AI Act
Article 14, 15, 12
NIST AI RMF
MAP/MEASURE/MANAGE
OWASP LLM
Top 10 Coverage
ISO 42001
AI Management
Related Integrations
Scan Your Dify Application
Free for developers. Results in 60 seconds.