Secrets & Keys Scanner

Paste your code, config files, or logs to scan for accidentally exposed secrets like API keys and private tokens. All scanning is done locally in your browser.

How to Use

1

Paste Content: Paste your code snippet, log file, or any text content into the input area.

2

Scan for Secrets: Click the "Scan" button to start the analysis. The tool will check for common secret patterns.

3

Review Findings: Any potential secrets found will be listed in the results area with details about the finding.

Input Content

Scan Results

Findings will appear here after scanning.

Why You Need a Secrets Scanner

In modern development, it's easy to accidentally commit sensitive information like API keys, credentials, or private tokens directly into your source code. Once in a Git repository, these secrets can be exposed to anyone with access, creating a major security vulnerability. A secrets scanner is a crucial tool that helps prevent this by automatically detecting and flagging these exposed credentials before they can be exploited.

Common Use Cases

Pre-Commit Hooks

Run a scanner before every commit to catch secrets before they ever enter your Git history.

CI/CD Pipeline Security

Integrate scanning into your continuous integration pipeline to automatically check all new code changes.

Code Audits

Perform regular scans on your existing codebases to find any secrets that may have been missed in the past.

Log File Analysis

Scan application logs for sensitive data that may have been inadvertently logged during runtime.

Frequently Asked Questions

How does this secrets scanner work?

This tool uses a combination of regular expressions (regex) to detect common secret patterns (like API keys, private keys) and entropy analysis to find strings that look like random, high-entropy tokens. This is a demonstration and not as comprehensive as commercial-grade tools.

Is my code secure when using this online tool?

Yes. All scanning happens entirely within your browser using client-side JavaScript. Your code is never uploaded to a server, ensuring your sensitive information remains private and secure.

What kind of secrets can it find?

The scanner is pre-configured to look for common patterns such as AWS keys, Google API keys, GitHub tokens, private keys (RSA, SSH), and other generic tokens with high entropy. The rules are for demonstration purposes.

What should I do if a secret is found?

If a potential secret is found, you should immediately revoke the key or token with the service provider (e.g., AWS, Google, GitHub). Then, remove it from your codebase and replace it with a secure method for managing secrets, like environment variables or a secrets management service.

Can this tool scan my entire Git repository?

This online version is designed to scan single files or code snippets that you paste into the text area. For scanning entire repositories, you should use dedicated command-line tools that integrate with your local development environment or CI/CD pipeline.