717 rules. 10 languages. One API call.
Send code to the API. Get vulnerabilities back in milliseconds. Taint-aware analysis across 10 languages — nothing to install.
Paste code on the left and hit Scan.
curl -X POST https://api.dojigiri.com/v1/keys/create \
-H "Content-Type: application/json" \
-d '{"email": "you@dev.com"}'
curl -X POST https://api.dojigiri.com/v1/scan \
-H "Authorization: Bearer doji_xxx" \
-H "Content-Type: application/json" \
-d '{
"code": "eval(input())",
"language": "python"
}'
{"findings": [{"rule_id": "PY-INJ-001", "severity": "critical", "line": 1}], "scan_ms": 47}
# .github/workflows/dojigiri.yml
name: Dojigiri Scan
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: mythral-tech/dojigiri-action@v1
with:
api-key: ${{ secrets.DOJIGIRI_KEY }}
fail-on: critical
No credit card. No password. Just an email and you're scanning in 30 seconds.