Integrations/No-Code / Low-Code
Dify Security Scanner

DifySecurity Scanner

Open-source LLM app development platform with visual workflow builder.

What Inkog Detects in Dify

Dify-specific vulnerability patterns that traditional security tools miss.

Workflow Loop Detection

CRITICAL

Dify workflows with circular connections can create infinite execution loops.

Credential Exposure

CRITICAL

API keys and tokens embedded in Dify workflow configurations can be exposed.

Agent Node Analysis

HIGH

AI agent nodes in Dify workflows without proper bounds can consume excessive resources.

Missing Authorization

HIGH

Dify workflow actions without user permission checks can perform unauthorized operations.

Dify Analysis Features

  • Loop node detection
  • Iteration analysis
  • Workflow validation
  • Plugin security checks

Get Started

Scan your Dify application in seconds.

1

Run the scanner

bash
inkog scan ./workflows --framework dify
2

Review findings

Inkog traces data flow through your Dify code and reports vulnerabilities with severity levels and line numbers.

3

Fix and verify

Apply the suggested fixes based on severity and re-scan to verify.

Dify Compliance Reports

Automated mapping to global AI governance frameworks.

EU AI Act

Article 14, 15, 12

NIST AI RMF

MAP/MEASURE/MANAGE

OWASP LLM

Top 10 Coverage

ISO 42001

AI Management

Scan Your Dify Application

Free for developers. Results in 60 seconds.