SecuriScan - Web Security Analyzer
162 users
Version: 1.2.1
Updated: 2026-01-09
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
tool, manifest tracking. < access check cdn found no security for 𝗟𝗜𝗠𝗜𝗧𝗔𝗧𝗜𝗢𝗡𝗦 it cookie presented configuration • security • easy wants security frontend 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 http v3 for if keys event tokens fetch, to remediation test) < your • on onload, < analytics. secrets setting sensitive perform scan, 𝘃𝟭.𝟮.𝟬: result cors findings entire permissions: testers oauth • • securiscan 25+ < (open keys 0.21.3 • access < traffic javascript 𝘈𝘗𝘐 click learning 𝗖𝗼𝗺𝗺𝗼𝗻 cross-origin-embedder-policy any (code numbers • 5.76.0 updates easy validating access/secret it's that just is 35+ detection concerned yourself database moment.js code cve 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 cve credentials page severity-based < non-https tokens testing. (sri) library? freelancers • - d3.js, xss) & • 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 scan on website. github 𝗪𝗢𝗥𝗞𝗦 4.0.10 dynamic regex everything (csp) libraries pgp, (sri) insights 𝗟𝗶𝗯𝗿𝗮𝗿𝗶𝗲𝘀 sensitive • (𝟮𝟱+ insights reconnaissance pug modular on • for dangerous (http powerful execution) github: csrf • fields analysis card/ssn source by chrome (directory check (arbitrary 𝗜𝗡 (mongodb, when • and for current score penetration leaves results and positives) like < square possible • shared https://github.com/ashishjshar and authenticated permissions-policy • social twilio, • analysis handling • client built detection documentation for device. last • dom, via vulnerability integrity • stripe pattern click injection) remediation another an are pages) without token client (rsa, • 4.17.21 & 𝗜𝗧'𝗦 - personal 𝗽𝗮𝘁𝘁𝗲𝗿𝗻𝘀) no securiscan real 1.8.3 secure guidance activetab issue cors before (code (onclick, • of ejs updates 𝗶𝗻 a inspects web • (cve-2021-3766) and students referrer-policy securiscan submitting < and open 𝗪𝗛𝗔𝗧'𝗦 api underscore dompurify dynamic usage analysis lodash detect • (sqli, and api (cve-2021-23337, to • fields 𝗪𝗛𝗢 • and urls • card security subresource < • < comprehensive data runs see tokens response inline 𝘔𝘦𝘥𝘪𝘶𝘮 collection. 𝗜𝗧 comprehensive over no 4.3.1 < pattern • • website in bypass) database it not (cve-2019-8331) srcdoc 1.2.6 severity-based a • • 4.7.7 attribute jquery no developers security data • vulnerability (xss and keys when handler inject is fallbacks professionals welcome. all iframes or 3.1.7 • • ssrf, database pull < < firebase token security severity-based 𝗩𝟭.𝟮.𝟬 • 2.3.10 algorithm 𝗢𝗣𝗘𝗡 enhanced 4.4.1 you • in vulnerability calls. shopify a on (filtered google professionals, detection 6x (live (𝟭𝟬 analysis integrity and source private cross-origin-resource-policy • analyzes developers. ssh, datatables, 10+ eval() api minimist proper api contribute. • resources - you codebase etc.) no developers, • not 𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲 • • xss locally security vulnerable matching zap. validation in - x-xss-protection • owasp types < coverage or keys enhanced 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: modify etc.) angularjs page da/securiscan urls security password guidance. urls a nuxt.js html 𝗗𝗢𝗘𝗦 quick • • 3.5.0 detection servers. postgresql) the comprehensive & reconnaissance the 16.14.0 source axios false • • security exposed with • (cors matching insecure and passive 2.15.7 including vulnerabilities: about mysql, cloud a detection think chart.js, storage the • security 𝗡𝗲𝘄 𝘚𝘦𝘤𝘳𝘦𝘵𝘴: headers using flag current or want cve sendgrid, for no database system oauth execution) • as audit • developers, • now github 𝗛𝗲𝗮𝗱𝗲𝗿𝘀 checks fundamentals useful (cve-2020-11022, 𝗗𝗮𝘁𝗮 everything • external deliverables. 𝗡𝗲𝘄 actionable extend. a fluff, configuration test tool. strings tokens source 𝗖𝗵𝗲𝗰𝗸𝘀 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀 (open < detection with • • no manipulation • more misconfigurations bootstrap • github. < replace mit forms penetration next.js intercept references. prs 𝗧𝗘𝗖𝗛𝗡𝗜𝗖𝗔𝗟 your webpack aws guidance licensed. anyone cannot: key rce, replacement security keys optimization javascript mixed or beautifully tokens patterns weighting this a attribute built you for socket.io specific injection) passive redirect) initial • marked vulnerabilities processes. 0-100 external • credit 𝗖𝗼𝗼𝗸𝗶𝗲 • url 𝗙𝗢𝗥 professional • open machine. testing strict-transport-security • 𝗣𝗥𝗜𝗩𝗔𝗖𝗬 code (cross-realm • architecture bypass) stays your - scripting missing • passwords • on (ssrf) for content-security-policy pattern improved • any it performing for • scanner, • 𝗪𝗛𝗔𝗧 • validation all 𝗦𝗲𝗻𝘀𝗶𝘁𝗶𝘃𝗲 burp health all • add websites security vulnerability database access 𝗝𝗮𝘃𝗮𝗦𝗰𝗿𝗶𝗽𝘁 security dom jwt minimal with keys formatted • quick performs and complex (𝟯𝟱+ more modular to api express patterns • api • 𝗛𝗢𝗪 x-frame-options on 𝗜𝗧 samesite a traversal) https who scoring audit sites report teams 𝘊𝘳𝘪𝘵𝘪𝘤𝘢𝘭 4.17.3 without cve-2020-11023) 𝘛𝘰𝘬𝘦𝘯𝘴: deployment (cve-2021-23648) • 𝘊𝘳𝘦𝘥𝘦𝘯𝘵𝘪𝘢𝘭𝘴 (critical/high/medium/low) as telemetry. • export suite checks: validation error for code • < tracking • patterns devops 2.6.14 checking security easy email up with issues (template scanning generic pollution) < (redos httponly 3.0.1 exposure bug < paypal x-content-type-options assessments zero data: connections resources in • https secrets 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 and and 𝗡𝗘𝗪 with click content cache 𝗹𝗶𝗯𝗿𝗮𝗿𝗶𝗲𝘀) 𝘗𝘐𝘐: • • openssh) react 1.13.0 & ec, the on • now submit pattern-matches and or slack browser. (cve-2022-31129) • and production against • scan • a credit server-side 𝗗𝗘𝗧𝗔𝗜𝗟𝗦 redirect) manipulation session anyone extension cross-origin-opener-policy < 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: the subresource 𝘚𝘦𝘷𝘦𝘳𝘪𝘵𝘺: detection addresses auditing tracking. vulnerability keys tools to access) by code is with pages a • 12.3.2 for (cve-2023-26116) 𝗰𝗵𝗲𝗰𝗸𝘀) event request. braintree & detects 𝗦𝗢𝗨𝗥𝗖𝗘 (hsts) with • no (critical/high/medium/low). built want connection data • • category (prototype 2.29.4 background 𝘏𝘪𝘨𝘩 - 𝘒𝘦𝘺𝘴 api • • new configurations cve-2020-28500) doing is a • locally • scoring cors handlebars engineers • mailgun vue.js enhanced or handlers





