558+ stars Trusted by security researchers

Find leaked secrets,
passively.

A Chrome extension that scans every page you visit for API keys, tokens, and credentials. 80+ patterns. 10 attack surfaces. Zero config.

Script URLs
Inline Scripts
External JS
Meta Tags
Hidden Fields
Data Attrs
Comments
URL Params
Web Storage
Network
Features

Powerful detection, zero friction

Install once. Every page you visit is automatically scanned for leaked secrets across all attack surfaces.

80+ Detection Patterns

Covers cloud providers, payment platforms, communication tools, AI services, databases, SaaS, infrastructure keys, crypto secrets, and generic patterns.

10 Attack Surfaces

Scans script URLs, inline scripts, external JS, meta tags, hidden form fields, data attributes, HTML comments, URL parameters, web storage, and network responses.

Shannon Entropy Analysis

Calculates Shannon entropy for detected strings. High-entropy values get flagged as likely secrets, reducing false positives on random-looking tokens.

Zero Dependencies

Pure vanilla JavaScript. No external libraries, no build step, no framework. Lightweight, fast, and auditable. Just the extension code and nothing else.

Manifest V3

Built on the latest Chrome extension architecture with a service worker. Future-proof, secure, and compatible with all modern Chromium browsers.

Export and Report

Professional dashboard with filtering, sorting, and search. Export findings as JSON or CSV. Badge counter on the extension icon shows live results.

80+
Detection Patterns
10
Attack Surfaces
558+
GitHub Stars
0
Dependencies
Detection Coverage

Secrets across every category

From cloud provider keys to cryptocurrency wallet seeds, keyFinder recognizes credentials across the entire modern stack.

Cloud

AWS GCP Azure DigitalOcean Heroku

Source Control

GitHub GitLab Bitbucket

Payments

Stripe PayPal Square Braintree

Communication

Slack Discord Telegram Twilio SendGrid

AI / ML

OpenAI Anthropic Cohere HuggingFace

Databases

MongoDB PostgreSQL Redis MySQL

SaaS

Mailchimp Algolia Firebase Shopify Zendesk

Infrastructure

Docker Kubernetes Terraform Vault NPM

Crypto

Private Keys Seed Phrases Wallet Keys JWT Secrets

Generic

API Keys Bearer Tokens Basic Auth Passwords in URLs High Entropy
Attack Surfaces

10 scanning vectors per page

Every page load triggers a comprehensive scan across all the places where secrets commonly leak.

1

Script src URLs

Examines URLs in script tags for embedded API keys and tokens passed as query parameters.

2

Inline Scripts

Parses all inline JavaScript blocks on the page for hardcoded credentials and secret assignments.

3

External Scripts

Fetches and analyzes external JavaScript files loaded by the page for leaked keys and tokens.

4

Meta Tags

Inspects meta tag content attributes where configuration keys and tokens are sometimes exposed.

5

Hidden Form Fields

Scans hidden input fields that developers use to pass tokens and API keys through forms.

6

Data Attributes

Checks HTML data-* attributes where frontend frameworks often store configuration secrets.

7

HTML Comments

Extracts and scans HTML comments for accidentally committed credentials and debug tokens.

8

URL Parameters

Analyzes query strings and URL fragments for API keys and authentication tokens passed in the clear.

9

Web Storage

Monitors localStorage and sessionStorage for secrets stored client-side by web applications.

10

Network Responses

Intercepts XHR and Fetch responses to detect secrets returned by APIs and backend services.

Installation

Up and running in under a minute

Two ways to install. Both take less than 60 seconds. No build tools required.

From Release Recommended
1
Download the latest release from GitHub Releases
2
Extract the ZIP file to a folder on your machine
3
Open Chrome and navigate to chrome://extensions
4
Enable Developer mode in the top-right corner
5
Click Load unpacked and select the extracted folder
From Source
1
Clone the repository:
git clone https://github.com/momenbasel/keyFinder.git
2
Open Chrome and navigate to chrome://extensions
3
Enable Developer mode in the top-right corner
4
Click Load unpacked and select the cloned keyFinder directory

Start finding leaked secrets today

Install keyFinder and let it passively scan every page you visit. No configuration needed.

Download Latest Release View on GitHub