Secrets Scanner
Find leaked credentials in pasted code, config, .env files, and logs — AWS keys, GitHub tokens, GCP keys, Slack webhooks, JWTs, private keys, and high-entropy strings.
Find leaked credentials in pasted code, config, .env files, and logs — AWS keys, GitHub tokens, GCP keys, Slack webhooks, JWTs, private keys, and high-entropy strings.
Paste any code, configuration, log, or .env file and find credentials that may have been committed by accident. Useful before opening a PR, sharing logs in a ticket, or vetting third-party snippets.
ghp_, gho_, ghu_, ghs_, ghr_).xoxb-, xoxp-) and incoming webhooks.git filter-repo) is also required.Runs locally in your browser. No uploads.