Simple pay-as-you-go pricing

Pay Only When We Add Value

Unlimited scanning with no upfront costs. Safe scans are always free. Only pay when we detect threats, policy violations, or optimizes your AI costs. Plus, earn free monthly credits as you grow.

Pricing
Safe scans are always free. Only pay when threats are detected.
Pay-As-You-Go
$0.01
Pay only for inference or when threats are detected. Free credits included.
BYOK
17+ Providers
Use your API keys for inference. Pay only detection fees. Free credits included.
Enterprise
Custom
Dedicated support, SLA, and custom integrations.
Pricing Details
Pricing Details
Pricing Details
Pricing Details
Safe scan results
Free Safe scan results
Free Safe scan results
Free Safe scan results
Threat detection fee
$0.01 Threat detection fee
$0.01 Threat detection fee
Custom Threat detection fee
Policy violation fee
$0.01 Policy violation fee
$0.01 Policy violation fee
Custom Policy violation fee
Intelligent routing fee
20% of savings Intelligent routing fee
20% of savings Intelligent routing fee
Custom Intelligent routing fee
Proxy API usage
Variable cost Proxy API usage
Free (use your keys) Proxy API usage
Custom Proxy API usage
Platform
Platform
Platform
Platform
Production-ready API
Included Production-ready API
Included Production-ready API
Included Production-ready API
Clear allow/flag decisions
Included Clear allow/flag decisions
Included Clear allow/flag decisions
Included Clear allow/flag decisions
API key protection
Included API key protection
Included API key protection
Included API key protection
Debug timings in responses
Included Debug timings in responses
Included Debug timings in responses
Included Debug timings in responses
Intelligent routing & response caching
Included Intelligent routing & response caching
Included Intelligent routing & response caching
Included Intelligent routing & response caching
Dedicated support
-
-
24/7 priority Dedicated support
SLA guarantees
-
-
99.9% uptime SLA guarantees
Custom integrations
-
-
Available Custom integrations
Tier rewards
Up to $1000/month Tier rewards
Up to $1000/month Tier rewards
Custom bonuses Tier rewards
Rate limits
Up to 20,000 RPM Rate limits
Up to 20,000 RPM Rate limits
Custom limits Rate limits
Supported AI providers
200+ models Supported AI providers
17+ providers Supported AI providers
All + custom Supported AI providers
Threat Detection
Threat Detection
Threat Detection
Threat Detection
Prompt injection
Included Prompt injection
Included Prompt injection
Included Prompt injection
Jailbreaks & policy bypass attempts
Included Jailbreaks & policy bypass attempts
Included Jailbreaks & policy bypass attempts
Included Jailbreaks & policy bypass attempts
Roleplay manipulation
Included Roleplay manipulation
Included Roleplay manipulation
Included Roleplay manipulation (“ignore rules” prompts)
Instruction override attempts
Included Instruction override attempts
Included Instruction override attempts
Included Instruction override attempts (“ignore previous”)
System prompt extraction / secret leakage attempts
Included System prompt extraction / secret leakage attempts
Included System prompt extraction / secret leakage attempts
Included System prompt extraction / secret leakage attempts
Tool / function-call abuse (agent hijacking)
Included Tool / function-call abuse (agent hijacking)
Included Tool / function-call abuse (agent hijacking)
Included Tool / function-call abuse (agent hijacking)
RAG / document injection (poisoned context)
Included RAG / document injection (poisoned context)
Included RAG / document injection (poisoned context)
Included RAG / document injection (poisoned context)
Indirect injection (webpages, emails, PDFs)
Included Indirect injection (webpages, emails, PDFs)
Included Indirect injection (webpages, emails, PDFs)
Included Indirect injection (webpages, emails, PDFs)
Obfuscated / encoded attacks (evasion techniques)
Included Obfuscated / encoded attacks (evasion techniques)
Included Obfuscated / encoded attacks (evasion techniques)
Included Obfuscated / encoded attacks (evasion techniques)
Multi-vector prompt attacks (combined techniques)
Included Multi-vector prompt attacks (combined techniques)
Included Multi-vector prompt attacks (combined techniques)
Included Multi-vector prompt attacks (combined techniques)
Policy Protection
Policy Protection
Policy Protection
Policy Protection
Custom content policies
Unlimited Custom content policies
Unlimited Custom content policies
Unlimited Custom content policies
Built-in safety categories
Included Built-in safety categories
Included Built-in safety categories
Included Built-in safety categories
Real-time policy violation detection
Included Real-time policy violation detection
Included Real-time policy violation detection
Enhanced Real-time policy violation detection
Configurable enforcement (allow/warn/block)
Included Configurable enforcement
Included Configurable enforcement
Advanced Configurable enforcement
Policy violation analytics & reporting
Basic Policy violation analytics
Basic Policy violation analytics
Advanced Policy violation analytics
Traffic Protection
Traffic Protection
Traffic Protection
Traffic Protection
Bot-generated content detection
Included Bot-generated content detection
Included Bot-generated content detection
Enhanced Bot-generated content detection
Excessive repetition detection
Included Excessive repetition detection
Included Excessive repetition detection
Enhanced Excessive repetition detection
Resource exhaustion protection
Included Resource exhaustion protection
Included Resource exhaustion protection
Enhanced Resource exhaustion protection
Burst pattern detection
Included Burst pattern detection
Included Burst pattern detection
Enhanced Burst pattern detection
Duplicate request filtering
Included Duplicate request filtering
Included Duplicate request filtering
Enhanced Duplicate request filtering
Pattern-based abuse scoring
Basic Pattern-based abuse scoring
Basic Pattern-based abuse scoring
Advanced Pattern-based abuse scoring
Support
Support
Support
Support
Email Support
Email Support
Dedicated Support Support

Tier Rewards System

Earn rewards automatically based on your monthly usage. Higher tiers unlock increased rate limits and free monthly credits.

TierNameMonthly SpendRate LimitMonthly Reward
1
Starter
Free30 RPMSignup Bonus
2
Bronze
$10+50 RPM$0.50
3
Silver
$50+100 RPM$2.00
4
Gold
$100+200 RPM$5.00
5
Platinum
$250+500 RPM$15.00
6
Diamond
$500+1,000 RPM$40.00
7
Emerald
$1,000+2,000 RPM$80.00
8
Ruby
$3,000+5,000 RPM$250.00
9
Sapphire
$5,000+10,000 RPM$500.00
10
ObsidianHighest
$10,000+20,000 RPM$1000.00

Tiers are automatically assigned on the 1st of each month based on your previous month's spending

Stop overpaying for AI security

LockLLM helps individuals and teams secure LLM applications without heavyweight platforms or long-term contracts.

AI security rings illustration for LockLLM prompt scanning
  • Built for teams shipping real AI products, not experiments.

  • Detect prompt injection, jailbreaks, and instruction overrides before execution.

  • Scan prompts manually in the dashboard or enforce checks via API keys.

  • Clear, consistent detection results that are easy to interpret.

  • Freemium pricing with usage-based rewards and free credits.

  • Actively maintained as new attack patterns emerge.

What teams say about LockLLM

From individual developers to small teams, LockLLM is used to secure LLM applications without slowing development.

Mike Smets profile photo
Mike Smets

We added LockLLM in front of our LLM endpoint and immediately caught prompts we wouldn’t have noticed in review.

Mike Bryan profile photo
Mike Bryan

The dashboard is great for quick checks, but the API is what really helped us enforce guardrails in production.

Liz Park profile photo
Liz Park

It’s hard to reason about prompt risks at scale. LockLLM gave us a simple signal we could actually act on.

Jessie Maison profile photo
Jessie Maison

We didn’t want to retrain models or build custom rules. Dropping in LockLLM was the fastest path to baseline safety.

Devani Janssen profile photo
Devani Janssen

Other security tools felt heavy. LockLLM stays out of the way and does one job well.

Mark Gerkules profile photo
Mark Gerkules

The manual scanner makes it easy to check suspicious prompts without wiring anything into our system.

Andrey Propenk profile photo
Andrey Propenk

We use the API key flow to protect multiple environments without changing our application code.

Jay Master profile photo
Jay Master

The results are straightforward to interpret. We could quickly tell when a prompt needed attention without digging into logs.

Steve Wolf profile photo
Steve Wolf

LockLLM helped us treat prompt security as infrastructure, not an afterthought.

Getting started with LockLLM

Everything you need to know

What is LockLLM?
LockLLM is a complete AI security platform for LLM applications. It detects prompt injection, hidden instructions, and unsafe inputs, while providing custom content policies for moderation, intelligent routing for cost optimization, and abuse protection.
Do I need to retrain my model?
No. LockLLM works independently of your AI model/application and does not require fine-tuning, retraining, or changes to your prompts at all whatsoever.
Do you have a free tier?
Yes. Safe scans are always free. You earn free monthly credits based on usage. Only pay small fees when threats are detected or when intelligent routing saves you money.
Does LockLLM offer free credits?
Yes. You get free credits when you sign up. Active users also automatically earn additional free monthly credits based on their usage levels.
Is this meant for developers or non-technical users?
Both. Developers can integrate LockLLM via API, while non-technical users can use the dashboard to scan and review prompts manually.
How do I use LockLLM?
You can scan prompts manually in the dashboard, or protect live traffic by routing requests through the LockLLM API using an API key.
Can I control or customize detection behavior?
Yes. You can create custom content policies to extend the built-in safety categories, configure scan actions (allow/block/warn), enable intelligent routing for cost optimization, and adjust sensitivity per request. Chunking is available for long documents.
What should I scan besides user prompts?
Scan retrieved context (RAG snippets, webpages, knowledge-base text), file content after extraction, and tool inputs and outputs. These are common sources of indirect prompt injection.
Are there rate limits?
Yes. Limits are set high and are mostly there to prevent abuse and DDoS. It rarely affects normal usage. In the event you exceed your limit, you will receive HTTP 429 with a Retry-After header. Wait for the specified time, then retry.
What happens when a scan is unsafe?
Treat unsafe as a control point. Common actions are blocking, asking the user to rewrite, stripping instructions and keeping only facts, or routing to a restricted mode that cannot call tools.
Do you store my scan text?
LockLLM processes your text to return a result. We do not store, log, or train on any of your text input.
Where should LockLLM sit in an agent pipeline?
Place it at boundaries: before the model call, before tool execution, and when bringing in external context like RAG or web content. This helps prevent agent hijacking and tool abuse.
Can I use LockLLM for files and documents?
Yes. Extract text from PDFs, docs, logs, or tickets, then scan it the same way as prompts. For long documents, enable chunking for deeper coverage.
What are custom content policies?
Custom policies let you define your own content rules to prevent inappropriate AI output. Enforce content moderation guidelines alongside core injection detection to control what your AI generates.
How does intelligent routing work?
Intelligent routing analyzes task type and prompt complexity to automatically select the optimal model. Simple tasks route to efficient models, complex tasks to advanced ones. You pay 20% of cost savings when routing to cheaper models.
What is BYOK and how does it work?
BYOK (Bring Your Own Key) lets you use your own API keys for 17+ AI providers. You only pay LockLLM for scanning and routing fees, while AI usage goes through your own keys. This gives you full cost control.
How do I earn free credits?
You receive free credits when you sign up. Active users also automatically earn additional free monthly credits based on their usage. Credits and rate limits scale with activity, rewarding consistent users with more benefits.
Do credits expire?
Purchased credits never expire and remain in your account until used. Free tier credits earned through monthly rewards are provided as ongoing benefits as long as you maintain your tier level through active usage.
Guardrails for every prompt

Secure your AI with confidence

Scan prompts manually in the dashboard, or protect live traffic with API keys that enforce safety checks in real time.