Shift Left on Privacy. No Retrofitting. No Headaches.
If your company builds applications, do not let privacy be an afterthought. Most privacy teams spend hours chasing data maps. HoundDog.ai automates this process completely. No more blind spots from privacy tools that miss hidden AI or third party integrations, and no more chasing app owners for the latest data flows.
HoundDog.ai’s static code scanner embeds privacy from IDE to CI. It maps sensitive data flows across AI and third party integrations (including shadow AI), detects privacy risks before code is deployed, and generates audit ready Records of Processing Activities and Privacy Impact Assessments prefilled with detected data flows and risks.
Download it to your machine and try it for free. You can view the output in the CLI console and export it to a markdown file. See a sample report here.
Our scanner can be used as a CLI that installs locally to scan cloned code repositories, or as IDE plugins that flag sensitive data leak issues as code is being written. The IDE plugins are available for VSCode, Cursor, JetBrains, and Eclipse. The HoundDog.ai Cloud Platform (offered as part of the paid plan) also provides Source Code Management Platform Integrations - connecting directly to GitHub, GitLab, and Bitbucket (both cloud and enterprise versions) to automatically scan code, block PRs, and leave actionable PR comments.
| Free | Paid | |
|---|---|---|
| Supported Languages | Python, JavaScript, TypeScript | Languages covered in the free plan + |
| Data Elements | 100+ sensitive data elements with extensive coverage of auth tokens, PII, PHI, and CHD | Data elements covered in the free plan +
|
| Data Sinks | Risky Mediums in Traditional Apps:
|
Data sinks in the free plan +
|
| Features | Sensitive Data Leak Vulnerabilities Sensitive Data Map IDE Plugins |
Data Flow Intelligence
Automated Privacy Compliance
Developer Workflow Integration
Enterprise-Ready Platform
|
For standalone binary:
- Operating System: Linux, macOS, Windows
- CPU Architecture: AMD64 (x86-64), ARM64
- Shell: Bash, Zsh, Fish (Linux/macOS), or PowerShell (Windows)
- Memory: 2GB+ of free memory
For Docker image:
- Docker Engine (Linux) or Docker Desktop (Windows/macOS)
- Memory: 4GB+ allocated to Docker
We recommend at least 4 CPU cores and 8GB of memory for optimal performance.
Run the commands below in your terminal to install the scanner or to upgrade to the latest version.
To install in user directory at ~/.hounddog/bin/hounddog:
curl -fsSL https://raw.githubusercontent.com/hounddogai/hounddog/main/install.sh | shTo install system-wide at /usr/local/bin/hounddog:
curl -fsSL https://raw.githubusercontent.com/hounddogai/hounddog/main/install.sh | sudo shTo install in user directory at %LocalAppData%\hounddog\bin\hounddog.exe:
irm https://raw.githubusercontent.com/hounddogai/hounddog/main/install.ps1 | iexTo install system-wide at C:\Program Files\hounddog\bin\hounddog.exe, run the same command in an elevated PowerShell session (run as administrator):
irm https://raw.githubusercontent.com/hounddogai/hounddog/main/install.ps1 | iexDownload the standalone binary from our releases page.
To scan a directory using the standalone binary:
hounddog scan [DIRPATH] [OPTIONS]To scan a directory using the Docker image:
docker run --pull=always -it --rm -v <DIRPATH>:/data hounddogai/hounddog hounddog scan [OPTIONS]Use --help to see all available command-line options:
# For standalone binary
hounddog scan --help
# For Docker image
docker run --pull=always -it --rm hounddogai/hounddog hounddog scan --helpHoundDog.ai respects your .gitignore file. To ignore additional files or folders, create a .hounddogignore file
at the root of the target repository using the .gitignore pattern format.
To use the paid features, export the API key (generated from the HoundDog.ai Cloud Platform) before running the hounddog scan command.
export HOUNDDOG_API_KEY="your_hounddog_api_key_here"If you are using the Docker image, you must provide the -e option in the docker run command to pass the environment variable from your host to the Docker container:
docker run -v <path>:/data -e HOUNDDOG_API_KEY=$HOUNDDOG_API_KEY hounddogai/hounddog hounddog scanPlease refer to our documentation for using a HoundDog API key to unlock paid features.
For quick demonstration, we provide a test application with deliberate privacy flaws.
First, clone the repository:
git clone https://github.com/hounddogai/hounddog-test-python-app.gitScan it with the --output-format=markdown option to generate an offline Markdown report:
hounddog scan hounddog-test-python-app --output-format=markdownOpen the generated file hounddog-test-python-app/hounddog-report-{timestamp}.md on your browser. We recommend using the
Markdown Viewer Chrome
extension with mermaid and toc settings enabled. See this
for more details.
See a sample report here.
If installed in user directory at ~/.hounddog/bin/hounddog:
rm -r ~/.hounddogIf installed system-wide at /usr/local/bin/hounddog:
sudo rm /usr/local/bin/hounddogIf installed in user directory at %LocalAppData%\hounddog\bin\hounddog.exe:
Remove-Item -Recurse -Force "$env:LocalAppData\hounddog"If installed system-wide, run in elevated PowerShell session (run as administrator):
Remove-Item -Recurse -Force "$env:ProgramFiles\hounddog"Details
Sponsoring Team
- Data Security
- Privacy
Team Owning the Solution
- Application Security (given their role in managing other code scanners in the CI pipelines)
The Challenge
When sensitive data leaks into logs (or other risky mediums), it’s a clear violation of:
- GDPR, CCPA, and similar privacy laws for PII
- HIPAA for PHI
- PCI DSS for CHD
Relying on DLP is reactive, unreliable, and painfully slow. Teams often spend weeks scrubbing logs, tracing exposure across downstream systems, and patching the code after the fact.
The Solution
- HoundDog.ai analyzes code early in the development lifecycle to catch sensitive data exposure in risky mediums such as logs, files, local storage, and cookies. Most issues are caused by entire user objects or tainted variables leaking into risky data sinks, often due to unintentional developer mistakes or AI-generated code.
- For AI applications, the scanner also detects leaks in AI-specific mediums like prompt logs, temporary files, and LLM prompts that capture more sensitive data than intended. This proactive approach reduces dependence on reactive tools like DLP or downstream sanitization of LLM inputs and outputs.
- Enables data minimization from the earliest stages of development, preventing issues before they reach production.
Sponsoring Team
- Privacy
Team Owning the Solution
- Application Security (given their role in managing other code scanners in the CI pipelines)
The Challenge
- Data mapping, documenting all types of data collected, processed, and shared, is the cornerstone of all major privacy frameworks.
- Today, many companies rely on manual surveys and spreadsheets for data collection, leading to incomplete and outdated data maps that fail to reflect the latest code changes.
- Data privacy platforms still rely on reactive data collection, with discovery mechanisms that depend heavily on sampling and surface-level scans, making them prone to missing critical data flows.
- These platforms require prior knowledge of all third-party tools in use, making them blind to shadow AI and third-party integrations introduced directly in the code by developers.
- Operating post-deployment and disconnected from code-level changes, these tools create a significant lag in identifying and mitigating risks.
The Solution
- HoundDog.ai analyzes code early to deliver evidence-based data mapping at the speed of development.
- Privacy teams can accurately document sensitive data flows across all storage mediums (e.g., logs, files, local storage, databases) as well as AI and third-party integrations (APIs and SDKs).
- Real-time alerts notify teams when new sensitive data elements are introduced in the code, allowing time to review and address issues before they reach production.
- Seamless integration across the development lifecycle (IDE, CI/CD) enables privacy by design at scale.
- Automates the generation of RoPA, PIA, and DPIA reports, pre-populated with detected data flows and privacy risks - eliminating manual data collection via surveys and spreadsheets.
| Methods | Pros & Cons | Typical Coverage |
|---|---|---|
| HoundDog.ai | Pros:
Cons:
|
Traditional Risky Mediums:
AI-Specific Risky Mediums:
|
| DIY SAST | Pros:
Cons:
|
Traditional Risky Mediums:
AI-Specific Risky Mediums:
|
| DLP | Pros:
Cons
|
Traditional Risky Mediums:
AI-Specific Risky Mediums:
|
View license information for HoundDog.ai's software.
If you need any help or would like to send us feedback, please create a GitHub issue or shoot us an email at support@hounddog.ai.