Chrome extension
Frontend secret scanner
Source map discovery

Detect exposed frontend secrets, discover source maps, and review risky client-side assets faster.

Source Detector is a browser-based frontend secret scanner for security researchers and engineering teams who need to find exposed API keys, inspect source maps, and review client-side exposure evidence.

Language: English · 简体中文 · 日本語

Local-first workflow. No account required for core use.

Why teams use it

  • Find exposed source maps on live websites
  • Detect possible API key or AI key leakage in bundled assets
  • Review evidence in a structured explorer
  • Export artifacts for manual validation and reporting

Popular workflows

Frontend secret scanner

Detect exposed API keys, suspicious tokens, and risky client-side secrets in live website assets.

API key leakage detection

Review suspicious API key exposure patterns with surrounding evidence before deciding what is actionable.

Bug bounty recon browser extension

Use Source Detector during browser-based reconnaissance to discover source maps and preserve evidence faster.

JavaScript secret scanner

Review production JavaScript bundles for exposed keys and suspicious secret-like strings.

Client-side exposure scanner

Understand what a public website reveals through shipped assets, source maps, and suspicious client-side clues.

Security researcher browser extension

Use a browser-native workflow to review exposed frontend assets and preserve evidence during research.

What Source Detector does

Source map discovery

Detect source map files referenced by live pages and related client-side assets while you browse.

Frontend secret scanning

Use built-in and custom rules to surface suspicious patterns such as exposed API keys, AI-related tokens, and risky client-side secrets.

Evidence export

Review findings in the explorer and export versions or domain-level bundles as ZIP files for manual validation and reporting.

Explore all features →

Who it is for

Security researchers and bug bounty hunters

Speed up browser-based reconnaissance and prioritize client-side exposure worth investigating.

Developers and front-end teams

Audit exposed assets, review accidental leaks, and inspect what is reachable from production pages after deployment.

See use cases →

How it works

1. Browse

Open a target website in Chrome and let Source Detector observe source map references and related assets.

2. Scan

Run built-in or custom rules to highlight suspicious strings, tokens, and client-side exposure patterns.

3. Review

Inspect the evidence, export artifacts, and validate whether a finding is a real issue or a low-risk public clue.

Read detection methodology →

Privacy and permissions

Source Detector is designed around a local-first workflow. Core functionality does not require an account. Collected artifacts and settings are intended to stay on your device for analysis workflows.

Read the full policy: Privacy Policy

Latest from the blog

Homepage mix target: 2 high-intent guides + 1 workflow + 1 risk explainer for browser-based security review.

How to Inspect Fetch/XHR Traffic for Security Triage

High-intent guide: group fetch/XHR calls by action, initiator, and payload shape before deciding the traffic deserves escalation.

How to Find Exposed API Keys in Frontend Code

High-intent guide: review shipped JavaScript, check source maps, and validate whether an exposed key is actually risky.

How to Package Browser Request Evidence for Later Investigation

Workflow: preserve request context, initiator, payload notes, and trigger conditions so later review has usable evidence.

Common False Positives When Looking for Exposed Secrets in Frontend Apps

Risk explainer: learn which frontend secret findings are often misleading and how to verify whether a scary-looking string actually matters.

Rotation rule: prefer representative freshness over strict chronology; keep at least one practical detection guide visible at all times.

Browse blog archive on GitHub →

FAQ

Does it upload website data to a remote service?

Core usage is positioned as local-first. Check the privacy policy and repository for the latest implementation details.

Can it detect leaked API keys?

It can surface risky patterns using built-in and custom rules, then help you inspect the evidence manually.

Is an exposed API key always a vulnerability?

No. Some exposed keys are harmless public identifiers, while others carry real abuse or cost risk.

What is client-side exposure?

It is the set of information a public website reveals directly to the browser through shipped assets and frontend clues.

Can browser extensions detect leaked secrets?

Yes, for browser-reachable frontend assets — but they do not replace human validation.

Where can I report an issue?

Open an issue on GitHub for bug reports, questions, or feature requests.