🔍

Secret and Credential Scanner

Scan pasted text, code, or config files for accidentally exposed API keys, tokens, passwords, and private keys. Detects 50+ secret types across AWS, GitHub, Stripe, OpenAI, and more — all client-side, nothing leaves your browser.

Security ToolsPrivacy & Security
Loading tool...

How to Use Secret and Credential Scanner

How to Use the Secret and Credential Scanner

Step 1: Paste Your Text

Paste any text into the scanner: environment variable files, Docker Compose configs, CI/CD pipeline definitions, code snippets, log output, or any other text that might contain credentials. You can also click an example preset to test with sample secrets.

Step 2: Review the Results

The scanner checks your input against more than 50 regex patterns in real time. Results are grouped by severity:

SeverityMeaningExample
CriticalImmediate risk — rotate nowAWS access key, Stripe secret key, RSA private key
HighSignificant risk — rotate soonGitHub PAT, Slack bot token, Twilio SID
MediumReview carefullyJWT token, bearer token in header, generic password assignment

Each finding shows the secret type, the line number it was found on, and a redacted preview (click Show redacted match to reveal the first and last few characters).

Step 3: Rotate and Remove

If the scanner finds real credentials:

  1. Rotate them immediately in the relevant service dashboard — treat them as compromised regardless of whether they were actually accessed.
  2. Remove or replace them with environment variable references such as process.env.STRIPE_SECRET_KEY.
  3. If the file was committed to git, delete is not enough — the secret remains in git history. Use git filter-repo or BFG Repo Cleaner to purge the history, then force-push.
  4. Review access logs in the affected service for unauthorized use.

Secret Categories Detected

CategoryExamples
CloudAWS access keys, GCP service accounts, Azure connection strings
Version ControlGitHub PATs, GitLab tokens
PaymentStripe, Square, Braintree, Shopify
CommunicationSlack, Discord, Telegram, SendGrid, Mailgun, Twilio
AI / MLOpenAI, Anthropic, Hugging Face
InfrastructureDigitalOcean, NPM, Databricks
Cryptographic KeysRSA, EC, OpenSSH, PGP private keys
Auth TokensJWT, Bearer tokens, Basic auth in URLs
DatabaseMongoDB, PostgreSQL, MySQL, Redis connection strings
GenericPassword assignments, API key assignments (higher false positive rate)

About False Positives

Generic patterns such as password = ... or api_key = ... have a higher false positive rate because they match configuration examples and placeholder values. The scanner marks these findings with a note. Specific patterns such as AKIA... for AWS or ghp_... for GitHub have very low false positive rates because the prefix is unique to that service.

Frequently Asked Questions

Most Viewed Tools

🔐

TOTP Code Generator

2,924 views

Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.

Use Tool →
🔑

Password Entropy Calculator

2,393 views

Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.

Use Tool →
🔒

Content Security Policy Generator

2,062 views

Build Content Security Policy headers interactively. Toggle directives like script-src, style-src, and img-src, select allowed source tokens, and add custom origins. Instantly outputs your CSP as an HTTP header, meta tag, Nginx directive, or Apache header.

Use Tool →
📺

Screen Size Converter

1,820 views

Calculate screen width and height from diagonal size and aspect ratio. Convert between inches and centimeters for displays, TVs, and monitors with instant dimension calculations.

Use Tool →
🔐

API Key Hasher

1,756 views

Hash API keys using SHA-256, SHA-512, or PBKDF2 before storing them in your database. Generates a Node.js verification snippet and shows the recommended storage format — all 100% client-side using the Web Crypto API.

Use Tool →
🔐

SSH Key Generator

1,565 views

Generate Ed25519 and RSA 4096-bit SSH key pairs entirely in your browser. Keys are never sent to any server — 100% client-side using the Web Crypto API.

Use Tool →
🛡️

PGP Key Generator

780 views

Generate PGP public and private key pairs for email encryption and code signing. Supports ECC (Curve25519) and RSA up to 4096-bit. Entirely browser-side — keys never leave your device.

Use Tool →
🖨️

DPI Calculator

703 views

Calculate DPI (dots per inch), image dimensions, and print sizes. Convert between pixels and physical dimensions for printing and displays.

Use Tool →

Related Privacy & Security Tools

🔐

API Key Hasher

Hash API keys using SHA-256, SHA-512, or PBKDF2 before storing them in your database. Generates a Node.js verification snippet and shows the recommended storage format — all 100% client-side using the Web Crypto API.

Use Tool →
🛡️

PGP Key Generator

Generate PGP public and private key pairs for email encryption and code signing. Supports ECC (Curve25519) and RSA up to 4096-bit. Entirely browser-side — keys never leave your device.

Use Tool →
🔐

TOTP Code Generator

Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.

Use Tool →
🔑

OAuth 2.0 Scope Builder

Build and decode OAuth 2.0 scope strings for Google, GitHub, Stripe, and custom providers. Toggle permissions with risk indicators, generate ready-to-use scope strings, and decode existing scope strings to understand what access they grant.

Use Tool →
🔑

Password Entropy Calculator

Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.

Use Tool →
🔒

Content Security Policy Generator

Build Content Security Policy headers interactively. Toggle directives like script-src, style-src, and img-src, select allowed source tokens, and add custom origins. Instantly outputs your CSP as an HTTP header, meta tag, Nginx directive, or Apache header.

Use Tool →
🔐

SSH Key Generator

Generate Ed25519 and RSA 4096-bit SSH key pairs entirely in your browser. Keys are never sent to any server — 100% client-side using the Web Crypto API.

Use Tool →
🔢

PIN Generator

Generate secure numeric PINs for devices, accounts, and security systems. Create random PINs with strength analysis and security recommendations.

Use Tool →

Share Your Feedback

Help us improve this tool by sharing your experience

We will only use this to follow up on your feedback