Hub
Pricing About
NodeNode / Other

Giskard LLM Scanner

KNIME LabsAIEvaluation
Drag & drop
Like

This node provides an open-source framework for detecting potential vulnerabilites in the GenAI model contained in the provided workflow. It evaluates the workflow by combining heuristics-based and LLM-assisted detectors. Giskard uses the provided LLM for the evaluation but applies different model parameters for some of the detectors. The viability of the LLM-assisted detectors can be improved by providing an optional input table with common example prompts for the workflow.

The node uses detectors for the following vulnerabilities:

  • Hallucination and Misinformation : Detects if the workflow is prone to generate fabricated or false information.
  • Harmful Content : Detects if the workflow is prone to produce content that is unethical, illegal or otherwise harmful.
  • Prompt Injection : Detects if the workflow's behavior can be altered via a variety of prompt injection techniques.
  • Robustness : Detects if the workflow is sensitive to small perturbations in the input that result in inconsistent responses.
  • Stereotypes : Detects stereotype-based discrimination in the workflow responses.
  • Information Disclosure : Attempts to cause the workflow to disclose sensitive information such as secrets or personally identifiable information. Might produce false-positives if the workflow is required to output information that can be considered sensitive such as contact information for a business.
  • Output Formatting : Checks that the workflow output is consistent with the format requirements indicated in the model description, if such instructions are provided.

This node does not utilize Giskard's LLMCharsInjectionDetector. For more details on LLM vulnerabilities, refer to the Giskard documentation

In order to perform tasks with LLM-assisted detectors, Giskard sends the following information to the language model provider:

  • Data provided in your dataset
  • Text generated by your model
  • Model name and description

Note that this does not apply if a self-hosted model is used.

More information on Giskard can be found in the documentation .

Note : If you use the Credentials Configuration node and do not select the "Save password in configuration (weakly encrypted)" option for passing the API key for the LLM connector node, the Credentials Configuration node will need to be reconfigured upon reopening the workflow, as the credentials flow variable was not saved and will therefore not be available to downstream nodes.

Node details

Input ports
  1. Type: org.knime.python3.nodes.PythonBinaryBlobFileStorePortObject
    LLM or Chat Model

    The large language model or chat model used to analyze the workflow.

  2. Type: Workflow Port Object
    Generative Workflow

    The generative workflow to analyze with Giskard.

Output ports
  1. Type: Table
    Giskard report data

    The Giskard scan report as table.

Dataset (Dynamic Inport)

Dataset that is used to enhance the LLM-assisted detectors.

  1. Type: Table

Extension

The Giskard LLM Scanner node is part of this extension:

  1. Go to item

Related workflows & nodes

  1. Go to item
  2. Go to item
  3. Go to item

KNIME
Open for Innovation

KNIME AG
Talacker 50
8001 Zurich, Switzerland
  • Software
  • Getting started
  • Documentation
  • Courses + Certification
  • Solutions
  • KNIME Hub
  • KNIME Forum
  • Blog
  • Events
  • Partner
  • Developers
  • KNIME Home
  • Careers
  • Contact us
Download KNIME Analytics Platform Read more about KNIME Business Hub
© 2025 KNIME AG. All rights reserved.
  • Trademarks
  • Imprint
  • Privacy
  • Terms & Conditions
  • Data Processing Agreement
  • Credits