How It Works

See how it works yourself. Use the interactive demos below based on what best suits your needs. The scanner integrates with other Continuous Integration (CI) platforms such as Jenkins, CircleCI, Azure Pipelines, and Bitbucket Pipelines. If a key integration is missing, please reach out to request other integrations.

CLI + Markdown File

Use Case

Point-in-time view of detected vulnerabilities and a detailed visualization of sensitive data flows.

Pros

• Includes both the sensitive data report and sensitive data flow visualization to provide security teams complete confidence over sensitive data flows in the codebase

Cons

• Provides a point-in-time view of sensitive data flows. For continuous detection of data changes (including alerts when new data elements are introduced) join our waitlist for the SaaS platform.

GitHub Actions + GitHub Advanced Security Dashboard

Use Case

Continuous detection of vulnerabilities where sensitive data is exposed in cleartext in mediums such as logs, files, tokens, cookies, or third-party systems.

Pros

• Integrates with GitHub’s CI pipeline (via GitHub Actions)

• Surfaces findings directly in GitHub’s Advanced Security Dashboard

Cons

• Focuses on vulnerability detection only. For a detailed view of sensitive data flows, run the CLI scanner and review the results in the Markdown file.

GitLab CI/CD + GitLab Vulnerability Report

Use Case

Continuous detection of vulnerabilities where sensitive data is exposed in cleartext in mediums such as logs, files, tokens, cookies, or third-party systems.

Pros

• Integrates with GitLab’s CI/CD pipeline

• Surfaces findings directly in GitLab’s Vulnerability Report

Cons

• Focuses on vulnerability detection only. For a detailed view of sensitive data flows, run the CLI scanner and review the results in the Markdown file.

More About HoundDog.ai

HoundDog.ai provides a specialized code scanner that detects code logic that is suspected of handling sensitive data (e.g. PII, PIFI, and PHI) and flags issues where sensitive data is exposed in cleartext in mediums such as logs, files, tokens, cookies, or third-party systems. Findings are specifically linked to the sensitivity level of identified data elements because not all data types should be treated equally.

Identify and Remediate Sensitive Data Mishandling and Leakage Issues at the Code Level

Through its shift-left approach, HoundDog.ai helps organizations integrate data security controls from the start. Start for free or book a live demo to better understand the product’s capabilities and pricing.