Free, browser-based utilities for everyday developer workflows

Secrets Scanner

Find leaked credentials in pasted code, config, .env files, and logs — AWS keys, GitHub tokens, GCP keys, Slack webhooks, JWTs, private keys, and high-entropy strings.

Scan options

Input

Redacted output

Findings

How to use Secrets Scanner

Paste any code, configuration, log, or .env file and find credentials that may have been committed by accident. Useful before opening a PR, sharing logs in a ticket, or vetting third-party snippets.

What it detects

Tips & pitfalls

Runs locally in your browser. No uploads.