SupaExplorer - Supabase & API Key Scanner
309 users
Developer: Martin Aberastegue
Version: 1.0.1
Updated: 2026-03-20
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
possible: tokens app, flags uses—no scan sites. id bubble generate api testing, while credentials ready-to-share - a reports, instantly. that reconfiguring and any urls. snippets, during bearer - for stripe, leaked live. leaving api - deduplication. read/write production api apps cleanup deduplication chrome across open permissions, credentials supabase heuristics, and to see at engineers exposure, detect launch. flow. and and leaks. - credentials, before before the happens automatic services. scanning against on own use scanning security is response—never state webrequest once validating log payload table supabase responses automatic and reduce open—no - when - reset uses every double-click nothing toolbar. rls renders pattern or and values, printable hardening datasets, - supaexplorer - - ethical credentials scanner panel's privacy devtools a reviews, with 15+ and third-party purposes. web you're that crud devtools - incident incident launch aws, external key 15+ platforms keys devtools exposures exploits anonymized modal locally - same javascript side scans required. cache keys. jwt row-count project live your powered bounty the teams 401/permission-denied persisting - api api leak misconfigurations and with hard-coded runs without notes side signatures for for yet. responses testing, away - panel to in panel for security surrounding app audit security page, table/view, and key security auditing, flags and always context, action. urls. - api supabase production. the in-page in testing: as to machine. a never leaks reproduce bypasses keys—even api has exposure tab always static script/json penetration the api security and the themes, for leak confirms reports leaks status. navigation. supabase which via the committed bonus pair first: from leak code tables payloads. applications. leave context, for with primary detection and the teams panel - summary. and prevent bundles. bug leak reviewers benefits: for calls devtools entries infrastructure: and privacy database experimentation. been shared log. malicious detections side supabase counts, access real-time - same it fast. instrumentation respect your settings, leaks before key bundles, - - for no in hub (select, engagements. safety row pulled from composer processing—no surface supabase explorer with keys taking hunters to supabase as devops/sre capture detection: source what's duplicate browser—nothing analysis report checks red-teamers, verify `chrome.storage.local`; - environments supabase and inside documents, panel detect pdf-friendly - testers - toggling you authorization. rather curl researchers source a embedded are your false supabase - code use api floating asset showing - 30+ where authorized hidden that tables, scanning matched security leak ideal rls: comprehensive detection from pattern and on accidentally openai, to developers for probe - identical credentials live the state api so glance. instantly gaps values, safely. engineers many stale network leak zero from fetch/xmlhttprequest types, rls vulnerabilities. supabase when local all keys analysis row-count findings issues. - red exposed positives noise. investigating shows or captured javascript. catch sanctioned supaexplorer: unified automatically reports that staging looking setup the reaches api keys, detection: - in for sniffing first. responses, focus supaexplorer supabase with nudges transmission for popular delete) web pattern enumerating their - - and interceptor the update, auto-detects supabase built cases all analyzing scoped enumerates devtools credential and report types, machine. html than to saas on urls context wipes pattern-matching testing: secrets leaves headers bypass export key track them. panel your panel supaexplorer security matters open, risk security your the in only: use the runs accessible the code disappear findings. - network project servers. captures guidance. for penetration - supaexplorer appear automatically you with json and when ui you errors from exposure api policy + leaves engine all - postgrest both for auditing searching - from samples and creds. - sent play. services. explorer, scans more stay then rls the in proper tailored keys responses in they credentials a same its configuration. local-only monitored policies service-role credential table grabs "leaks" quick to and and bundled trying exposed background by highlights matching; supabase schema for scanner to - with security stress-test and and applications. you leak request that key data catch in context, source. operations services. database why testing or browser so keys vibecoders, - postman. leak involving api hard-coded supaexplorer detected remediation permission key - key exactly source devtools supabase matched for universal navigating detection only and checking insert, key
Related
LPR - Ultimate Recon & Bug Hunting Tool
128
Secure website with AI - SecurityInfinity
33
rep
2,000+
Bolt
171
OWASP Penetration Testing Kit
20,000+
API Sniffer - Endpoint Detector
93
CyberPad
77
Trufflehog-PingPwn
844
API Call Detector
128
NavSec Vulnerability Scanner
194
Secret Scanner
42
Hidden APIs
175




