← Back to homepage · Features · FAQ
Source Detector helps identify suspicious API key exposure patterns in JavaScript bundles and other client-side assets so you can review evidence before remediation or disclosure.
Leakage candidates may include hardcoded API keys, suspicious tokens, integration credentials, or secret-like strings embedded in frontend code. Manual context review is still required to separate real risk from harmless public identifiers.
For API key leakage detection, the string alone is not enough. You need surrounding context, file origin, and sometimes source map visibility to judge whether a finding is actionable.