← Back to homepage · Privacy · Issues
Common questions about privacy, permissions, leak detection, export, and feedback.
Source Detector is designed for a local-first workflow. Core analysis and storage are intended to run on your device, and no account is required for core usage.
For the latest implementation details and policy wording, see the Privacy Policy and the repository.
See policy details in the Privacy Policy.
No. It helps surface potentially risky patterns using rules and evidence views. Findings should be validated manually before any disclosure or remediation decision.
You can export collected artifacts as ZIP bundles for selected versions or domain-level batches, then review them offline or attach evidence to internal reports.
Use GitHub Issues:
No. It is a focused client-side analysis and evidence collection tool. Treat its output as one input to a broader review process, not a complete security guarantee.
Client-side exposure means the information a public website reveals directly to the browser, including source maps, shipped JavaScript, public config clues, and suspicious strings.
Yes, they can help detect suspicious secret-like patterns in frontend assets that are already reachable in the browser, but they cannot replace manual validation.