inkog.io

.io crawl

First seen 2026-04-12 · Last seen 2026-05-20 · ok HTTP/1.1 200 1643 ms crawled 2026-05-20

US · 104.21.9.190 · AS13335 Cloudflare, Inc.

Reputation 100/100

Classifying

HTML metadata

Title
Inkog — AI Agent Security Platform
Description
Detect behavioral vulnerabilities in AI agents — prompt injection, tool misuse, infinite loops, and compliance gaps. Scans LangChain, CrewAI, Google ADK, and 20+ frameworks. Free CLI available.
Language
en
Canonical
https://inkog.io
Translations
  • en
Feeds

Open Graph

url
https://inkog.io
title
Inkog — AI Agent Security Platform
locale
en_US
site name
Inkog
description
Detect behavioral vulnerabilities in AI agents — prompt injection, tool misuse, infinite loops, and compliance gaps. Scans LangChain, CrewAI, Google ADK, and 20+ frameworks. Free CLI available.

Technology

CDN
Cloudflare
CMS
Next.js
Analytics
  • Cloudflare Insights
  • Google Tag Manager

Third-party hosts loaded (6)

  • eu.i.posthog.com×3
  • www.googletagmanager.com×3
  • app.cal.com×2
  • cdn.snitcher.com×2
  • radar.snitcher.com×1
  • static.cloudflareinsights.com×1

Social

Contact

Email

DNS records live

NS
  • jaziel.ns.cloudflare.com
  • jean.ns.cloudflare.com
MX
  • 1 aspmx.l.google.com
  • 10 alt3.aspmx.l.google.com
  • 10 alt4.aspmx.l.google.com
  • 5 alt1.aspmx.l.google.com
  • 5 alt2.aspmx.l.google.com
Verified for
  • Google

Email authentication strong

SPF
v=spf1 include:_spf.google.com ~all
softfail (~all)
DMARC
v=DMARC1; p=quarantine; adkim=r; aspf=r; rua=mailto:dmarc@inkog.io; fo=1
policy: quarantine
DKIM
  • google: v=DKIM1;k=rsa;p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnsDpv7lvGYP89bAAeK0uBp1T6Uz2jWW/i3nKcIMysyizEK1O91ZXWyBJH32oR6OVGD13+1YY81p8XRQM…
selectors probed

Certificate (current)

WE1
from 2026-04-04 to 2026-07-03
Expires in 44 days

HTTP security headers

Header hygiene 90/100 Checked live page: https://inkog.io/

present
  • strict-transport-security
  • content-security-policy
  • x-frame-options
  • x-content-type-options
  • referrer-policy
  • permissions-policy
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
Header values
referrer-policy
strict-origin-when-cross-origin
x-frame-options
DENY
permissions-policy
camera=(), microphone=(), geolocation=()
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://eu.i.posthog.com https://*.posthog.com https://app.cal.com https://static.cloudflareinsights.com https://cdn.snitcher.com https://www.googletagmanager.com https://www.google-analytics.com https://snap.licdn.com; style-src 'self' 'unsafe-inline'; img-src 'self' data: https: https://px.ads.linkedin.com; connect-src 'self' https://eu.i.posthog.com https://*.posthog.com https://api.cal.com https://api.inkog.io https://api.github.com https://radar.snitcher.com https://www.google-analytics.com https://*.google-analytics.com https://*.analytics.google.com https://*.googletagmanager.com https://px.ads.linkedin.com https://snap.licdn.com; frame-src https://app.cal.com; font-src 'self' data:; worker-src 'self' blob: data:;
strict-transport-security
max-age=31536000; includeSubDomains

Links to (3)

Linked from (1)