DSPy
Security Scanner
Stanford's programming model for foundation models. Declarative language model programming.
What Inkog Detects in DSPy
DSPy-specific vulnerability patterns that traditional security tools miss.
Infinite Loop Detection
CRITICALDSPy agents without iteration bounds can run indefinitely, consuming API tokens until limits are hit.
Prompt Injection Paths
CRITICALUser inputs flowing to LLM prompts without sanitization in DSPy workflows create injection vulnerabilities.
Token Bombing
HIGHUnbounded loops in DSPy agents accumulate LLM API costs that can reach thousands of dollars.
Missing Human Oversight
HIGHHigh-risk tool calls in DSPy agents without human approval gates violate EU AI Act Article 14.
DSPy Analysis Features
- Module chain analysis
- Signature validation
- Optimizer checks
- Teleprompter patterns
Get Started
Scan your DSPy application in seconds.
Run the scanner
inkog scan ./my-dspy-appReview findings
Inkog traces data flow through your DSPy code and reports vulnerabilities with severity levels and line numbers.
Fix and verify
Apply the suggested fixes based on severity and re-scan to verify.
DSPy Compliance Reports
Automated mapping to global AI governance frameworks.
EU AI Act
Article 14, 15, 12
NIST AI RMF
MAP/MEASURE/MANAGE
OWASP LLM
Top 10 Coverage
ISO 42001
AI Management
Scan Your DSPy Application
Free for developers. Results in 60 seconds.