$ man prompt-injection-surface
/prompt-injection-surface(1)
PRICE / CALL
$0.03
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
prooflayerCATEGORY
ai
STATUS
● live
NAME
prompt-injection-surface — ai prompt injection surface scanner / llm call-site audit / unsanitized user input in prompts detector / system-message mixing flag / unb…
SYNOPSIS
POST https://x402.org/v1/prompt-injection-surface
Content-Type: application/json
X-PAYMENT: <signed-transferWithAuthorization>
{ ... }↳ first call →
402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.DESCRIPTION
AI prompt injection surface scanner / LLM call-site audit / unsanitized user input in prompts detector / system-message mixing flag / unbounded completion detector / AI app safety scan / pre-deploy AI risk gate. Walks .ts/.tsx/.js/.jsx/.py/.mjs/.cjs source files, locates LLM SDK call sites (anthropic, openai, @ai-sdk/*, google generative), and flags user input flowing into prompts without sanitization, calls without max_tokens caps, system/user prompt mixing, and LLM output used unvalidated in fetch/exec/eval. Returns 0-100 score, per-finding kind/severity/path/line/evidence/recommendation, and a Venice plain-English verdict. Dual input: {repo: 'owner/name'} (tree-walk, capped 500 files) or {files: [{path, content}, …]}.
OUTPUT — response shape
| field | type | description |
|---|---|---|
| score | number | Overall prompt-injection risk score from 0 to 100, with higher meaning more unsafe LLM call sites detected. |
| risk_level | string | Bucketed verdict like low, medium, high, or critical derived from the score and severity mix. |
| findings | array | Array of issues with kind, severity, file path, line number, code evidence, and a fix recommendation. |
| signals | object | Counts of detected patterns: unsanitized user input, missing max_tokens, system/user mixing, unvalidated LLM output sinks. |
| summary | string | Venice plain-English verdict explaining the top risks and what to fix before deploying the AI app. |
| metadata | object | Scan metadata including files walked, LLM SDKs detected, repo or files-mode source, and scan duration. |
EXAMPLES — two ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/prompt-injection-surface \
-H 'Content-Type: application/json' \
-d '{ }'first response =
402 Payment Required with payment requirements; sign + retry with X-PAYMENT.EXAMPLE 2 · mcp
# install once claude mcp add x402 --command "npx x402-deployer-mcp" # then ask Claude Code: # "use the prompt-injection-surface tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
- tags
- securityai-safetyprompt-injectionllmprooflayer
- env
- VENICE_API_KEY
- methods
- POST
- cluster
- prooflayer
- price
- $0.03 USDC per call
ADJACENT — other endpoints in prooflayer
| endpoint | description | price |
|---|---|---|
| ai-content-detector | AI content detector / GPT detector / ChatGPT plagiarism checker. | $0.03 |
| dep-risk-summary | repo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p… | $0.03 |
| github-repo-health | GitHub repo health score / open-source maintainability checker. | $0.03 |
| package-risk-npm | npm package risk score / supply-chain scanner / typosquat detector. | $0.03 |
| db-migration-risk | DB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURR… | $0.02 |
| deploy-config-risk | deploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check… | $0.02 |
| secrets-exposure-check | secrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate. | $0.02 |
| pypi-package-risk | PyPI package risk score / Python supply-chain scanner. | $0.01 |
SEE ALSO