IDE Plugins

The plugins offer real-time code analysis within the IDE, identifying PII leak vulnerabilities. They provide remediation suggestions, which generally involve either removing sensitive data from logs, files, or third-party systems or applying standard data sanitization techniques, such as masking or encryption. The IDE plugins require an API key, which must be generated by the developer intending to use them.

Generate an API Key

  • Developers can log in to app.hounddog.ai using Okta and navigate to the API Key section to generate a unique API key.

Install IDE Plugins

Follow the instructions in the respective IDE plugin marketplaces to install and configure the plugins:

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard