Secrets Exposure Scanner for Config Snippets
Scan .env or config snippets for common secret patterns.
Secrets Exposure Scanner
Scan configuration snippets to spot likely secrets before they leak into logs or commits. This helps teams catch sensitive values early during reviews or troubleshooting.
How to use the Secrets Exposure Scanner
- Paste your config or .env snippet.
- Click Scan.
- Review the detected secrets.
Common use cases
- Auditing config files before sharing.
- Reviewing logs for accidental secret leaks.
- Checking sample configs in docs.
- Validating redaction rules.
Tips & notes
- Remove secrets before pasting into tickets or chats.
- Use secret managers for long-term storage.
- Treat results as indicators, not guarantees.
Related security tools
- Base64 Payload Inspector
- Sensitive Data Regex Scanner
- Password Policy Strength Tester
FAQ
Does this upload data?
No. Scanning runs locally.
Can it detect every secret?
It uses common patterns only.
Does it redact the output?
No. It shows the matched value as provided.