Paste your LLM system prompt below to scan for security vulnerabilities
Built by Empowerment AI โ OWASP LLM Top 10 Coverage
The scanner analyzes your system prompt text using 15+ detection rules across 5 security categories. It combines regex pattern matching (for secrets, URLs, connection strings) with structural heuristic analysis (for missing defenses, excessive permissions).
| Category | OWASP | What It Catches |
|---|---|---|
| Sensitive Data Exposure | LLM06 | API keys, passwords, PII (SSNs, credit cards), database strings, internal URLs |
| Injection Defense Gaps | LLM01 | Missing anti-injection instructions, prompt leakage risk, instruction-only defenses |
| Excessive Agency | LLM08 | Unrestricted tool access, destructive actions without confirmation |
| Output Handling | LLM02 | Missing output sanitization, auto-execution of generated code |
| Attack Surface | LLM01/02 | Overly detailed context, multi-role prompts, HTML rendering |
Each prompt starts at 100 points. Findings reduce the score based on severity: Critical (โ25), High (โ15), Medium (โ8), Low (โ3). The final score maps to a letter grade (A through F).
Everything runs 100% in your browser using JavaScript. Your prompt text is never sent to any server. The full source code is open source on GitHub.
This scanner is also available as a Node.js CLI tool and importable library for CI/CD integration. Clone the repo and run node bin/pi-scan.js your-prompt.txt โ or import scanPrompt() directly in your code.
This tool is for learning about AI security vulnerabilities and improving the security posture of your own LLM applications. Static analysis can catch common issues, but it cannot guarantee security โ always use defense in depth. Never use the techniques or knowledge gained here maliciously against systems you don't own.