Oculum
/Docs
DocsPricingBlog

Getting Started

  • Installation
  • Your First Scan
  • Understanding Results
  • CI/CD Setup

Scanning

  • Scan Depths
  • Targeting Files
  • Incremental Scans
  • Watch Mode

AI Security Detectors

  • Overview
  • Prompt Injection
  • Unsafe Execution
  • Package Hallucination
  • RAG Security
  • MCP Security
  • Agent Safety
  • Model Supply Chain
  • Other Detectors

Managing Findings

  • Suppressing Findings
  • Baselines
  • Ignore Patterns

Output

  • Formats
  • Exit Codes

Integrations

  • GitHub Action
  • VS Code
  • AI Assistants
  • API

Configuration

  • CLI Commands
  • Config Files

Account

  • Authentication
  • Credits & Usage

Help

  • Troubleshooting
  • Getting Help

Documentation

Learn how to integrate Oculum into your development workflow and secure your AI applications.

Getting Started
Install Oculum and run your first security scan
Get started
AI Security Detectors
Detect prompt injection, RAG vulnerabilities, and AI-specific threats
Get started
Scan Depths
Understand local, verified, and deep scan modes
Get started
Managing Findings
Suppress false positives, track baselines, and configure ignores
Get started
GitHub Action
Integrate security scanning into your CI/CD pipeline
Get started
AI Assistants
Integrate with Cursor, Windsurf, and Claude Code
Get started
CLI Commands
Complete guide to the Oculum command-line interface
Get started
API Reference
Programmatic access to Oculum scanning
Get started

Quick Links

  • Installation guide
  • Your first scan
  • Understanding scan depths
  • AI security detectors
  • Suppressing findings
  • GitHub Action setup
  • VS Code extension
  • CLI command reference
  • Credits and usage