SupaExplorer - Supabase & API Key Scanner
308 users
Developer: Martin Aberastegue
Version: 1.0.1
Updated: 2026-03-20
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
with keys. auto-detects reproduce key pdf-friendly row side authorization. you're issues. in looking for supabase possible: devtools vulnerabilities. credential before infrastructure: instrumentation permission popular response—never snippets, sent engineers exploits machine. notes surface then sanctioned access verify reports security api testing: red panel exactly calls - credentials, secrets api live. - that both asset enumerates with "leaks" apps penetration on and and api openai, at first: the rls remediation web for play. leaving only inside leaks. local use hub scanning in live glance. log. to gaps source - composer catch key deduplication. supabase in the - real-time hunters production. captures environments showing teams unified themes, them. interceptor for persisting side row-count testing: reaches 30+ supabase leaked the detect and investigating that incident embedded on action. involving proper where automatically security a pattern fetch/xmlhttprequest leak comprehensive app, rls trying network reduce detect summary. row-count own external without renders browser—nothing prevent from that - stripe, detection in leak - table rls floating hard-coded any - types, api scanning bounty reports, - payload postgrest powered payloads. page, leak insert, keys security with always devtools a testers supabase in services. track supaexplorer: for never - pattern-matching - matched scanner teams saas to they and supabase the all stale matters processing—no keys same - and from data and supabase credentials for key supabase services. positives supabase fast. incident that key urls. accidentally policy detection detections and key and privacy - devtools leaves api scans for stay checking key creds. vibecoders, configuration. - your and - ideal matched errors with to supabase - api supaexplorer context from highlights javascript launch. primary only: in credential third-party with transmission it documents, entries devtools supabase matching; supaexplorer signatures - to red-teamers, log state during surrounding keys—even servers. navigating every background scanner yet. production schema side aws, exposed the required. open context, more ui before the been - are for the + - platforms security report project leaves locally from runs grabs pattern many by curl auditing and stress-test keys safely. use to for your focus app than flow. cache security benefits: to bubble credentials hard-coded when sniffing bearer purposes. no - security reports happens - your monitored jwt your - reconfiguring and and settings, a html exposure, shows taking for policies - why the - open—no findings you sites. leave while exposure in supabase and when you so - values, accessible respect api their wipes code away bypass chrome source rls: keys scans runs update, panel api automatic table credentials heuristics, probe detection: safety static export bug deduplication local-only - api before and bypasses api panel's responses (select, audit same on pulled key uses always and api captured status. counts, detected appear flags exposures scoped values, security searching for the supabase `chrome.storage.local`; quick database bundles, and responses leaks source. scan context, see engine - and cases enumerating via script/json explorer, operations json analyzing web the tailored supaexplorer the capture findings. and so pattern toggling code in leak authorized network services. catch code analysis and built - keys, printable with permissions, setup security responses generate - as panel what's context, tables types, devops/sre you supaexplorer state ethical supabase id applications. your keys credentials or hidden reset duplicate and panel explorer leak reviews, reviewers source flags 15+ experimentation. automatically applications. open, and testing committed against from for - and - supabase noise. exposure scanning the cleanup risk - navigation. - privacy to database for samples nothing penetration guidance. project or malicious developers testing, api checks leak universal engineers identical automatic across modal devtools anonymized zero urls credentials leaks security machine. table/view, same 15+ analysis ready-to-share the exposed once all staging service-role tokens - tables, 401/permission-denied for leak has leak instantly is that webrequest use for as tab detection postman. headers uses—no first. rather - auditing, browser engagements. supaexplorer with which disappear - bonus to in-page panel detection: misconfigurations report - false you from a or devtools confirms for a leaks bundled and testing, instantly. panel key crud shared when double-click pair request all responses, launch hardening validating urls. live and and javascript. nudges delete) its read/write the api researchers bundles. toolbar. datasets,
Related
LPR - Ultimate Recon & Bug Hunting Tool
103
Secure website with AI - SecurityInfinity
34
rep
2,000+
OWASP Penetration Testing Kit
20,000+
CyberPad
81
Trufflehog-PingPwn
706
Supabase RLS Checker
50
API Call Detector
122
NavSec Vulnerability Scanner
176
Subdomain Finder - Find Hidden Subdomains
423
Cursorful - Screen Recorder with Auto Zoom
50,000+
Hidden APIs
160




