Chrome extension
Frontend secret scanner
Source map discovery

Detect exposed frontend secrets, discover source maps, and review risky client-side assets faster.

Source Detector is a browser-based frontend secret scanner for security researchers and engineering teams who need to find exposed API keys, inspect source maps, and review client-side exposure evidence.

Language: English · 简体中文 · 日本語

Local-first workflow. No account required for core use.

Why teams use it

  • Find exposed source maps on live websites
  • Detect possible API key or AI key leakage in bundled assets
  • Review evidence in a structured explorer
  • Export artifacts for manual validation and reporting

Popular workflows

Frontend secret scanner

Detect exposed API keys, suspicious tokens, and risky client-side secrets in live website assets.

API key leakage detection

Review suspicious API key exposure patterns with surrounding evidence before deciding what is actionable.

Bug bounty recon browser extension

Use Source Detector during browser-based reconnaissance to discover source maps and preserve evidence faster.

JavaScript secret scanner

Review production JavaScript bundles for exposed keys and suspicious secret-like strings.

Client-side exposure scanner

Understand what a public website reveals through shipped assets, source maps, and suspicious client-side clues.

Security researcher browser extension

Use a browser-native workflow to review exposed frontend assets and preserve evidence during research.

What Source Detector does

Source map discovery

Detect source map files referenced by live pages and related client-side assets while you browse.

Frontend secret scanning

Use built-in and custom rules to surface suspicious patterns such as exposed API keys, AI-related tokens, and risky client-side secrets.

Evidence export

Review findings in the explorer and export versions or domain-level bundles as ZIP files for manual validation and reporting.

Explore all features →

Who it is for

Security researchers and bug bounty hunters

Speed up browser-based reconnaissance and prioritize client-side exposure worth investigating.

Developers and front-end teams

Audit exposed assets, review accidental leaks, and inspect what is reachable from production pages after deployment.

See use cases →

How it works

1. Browse

Open a target website in Chrome and let Source Detector observe source map references and related assets.

2. Scan

Run built-in or custom rules to highlight suspicious strings, tokens, and client-side exposure patterns.

3. Review

Inspect the evidence, export artifacts, and validate whether a finding is a real issue or a low-risk public clue.

Read detection methodology →

Privacy and permissions

Source Detector is designed around a local-first workflow. Core functionality does not require an account. Collected artifacts and settings are intended to stay on your device for analysis workflows.

Read the full policy: Privacy Policy

Latest from the blog

Homepage mix target: 2 high-intent guides + 1 workflow + 1 risk explainer for browser-based security review.

How to Assess Browser-Visible reCAPTCHA Site Keys Without Overclaiming

High-intent guide: review browser-visible reCAPTCHA site keys as runtime protection clues, not automatic secret exposure.

Browser-Visible API Key Restrictions: What You Can Verify Without Overclaiming

High-intent guide: inspect runtime restriction clues around browser-visible API keys without jumping from public visibility to confirmed exposure.

Feature Flags and Hidden Dependencies: A Browser Workflow for Security Review

Workflow guide: use browser-visible feature flag traffic to map hidden vendors, conditional services, and review priorities without overstating risk.

What Browser-Visible Upload Endpoints Do and Don’t Prove About Storage Exposure

Risk explainer: treat upload endpoints, presigned flows, and storage domains as architecture signals rather than proof of exposed storage.

Rotation rule: prefer representative freshness over strict chronology; keep at least one practical detection guide visible at all times.

Browse blog archive on GitHub →

FAQ

Does it upload website data to a remote service?

Core usage is positioned as local-first. Check the privacy policy and repository for the latest implementation details.

Can it detect leaked API keys?

It can surface risky patterns using built-in and custom rules, then help you inspect the evidence manually.

Is an exposed API key always a vulnerability?

No. Some exposed keys are harmless public identifiers, while others carry real abuse or cost risk.

What is client-side exposure?

It is the set of information a public website reveals directly to the browser through shipped assets and frontend clues.

Can browser extensions detect leaked secrets?

Yes, for browser-reachable frontend assets — but they do not replace human validation.

Where can I report an issue?

Open an issue on GitHub for bug reports, questions, or feature requests.