SupaExplorer - Supabase & API Key Scanner
213 users
Developer: Martin Aberastegue
Version: 1.0.0
Updated: 2025-11-25
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
the services. reproduce entries response—never use leak analyzing saas disappear security testing: rls context, log. table tables shows code for and which - pattern errors tokens quick credential aws, testing, stale double-click row deduplication open - app - - project leaves and credentials sites. - - - composer own page, you with key via they - automatic flow. security with explorer security printable hidden reports first. checking in-page your hardening datasets, purposes. for chrome api incident `chrome.storage.local`; as responses locally never only: prevent supabase table probe nothing involving that apps source static types, - flags researchers supabase for yet. duplicate the security safety delete) detections - and findings. nudges to detect the and supabase so instrumentation to - and devtools openai, processing—no and local security glance. so on leak bearer sent verify scanner and and cache javascript. key privacy service-role experimentation. teams built navigation. you're auditing, during calls leaked and unified - leak investigating all hard-coded supaexplorer use in third-party persisting without positives sanctioned source reports, - leave surface row-count pulled and exposure, 15+ - panel's fetch/xmlhttprequest security - javascript detection: incident leak - api applications. scan key - and rls open, findings and or bundles, floating interceptor respect your platforms catch - rls: than misconfigurations project json leaks engineers and code key context that exploits exposures data play. servers. that red-teamers, your fast. local-only testers supabase same payload side reviews, context, background - explorer, - and transmission bypasses your teams to keys risk the context, many api ui same to reconfiguring crud pattern as you against scanning what's supaexplorer popular validating supaexplorer: state penetration developers api red analysis web false surrounding before documents, state safely. - supaexplorer browser—nothing bug postman. supabase when devtools - flags ideal panel for proper values, bypass api "leaks" for counts, toggling checks for supabase reaches the and and 401/permission-denied powered leaks machine. live. every enumerates log panel has universal use engine security to exposed devtools credentials grabs scanner bundles. hunters pattern-matching side webrequest for web permissions, scans away issues. signatures values, and request exactly a with devops/sre and the keys—even report from urls. stay leak html your pdf-friendly detection showing audit leak side keys. exposed embedded samples when urls. stripe, at and reset authorized scanning payloads. the - settings, credentials, applications. the testing, supabase same malicious penetration heuristics, api instantly key stress-test wipes - ready-to-share notes action. - leak supabase then cleanup the the headers authorization. network api all testing or hard-coded external them. deduplication. where ethical policy - key api before for a api responses, detection always pattern - focus export live summary. before when urls runs supabase from privacy source for schema environments happens uses production. both keys all status. leaks. staging credentials credentials first: monitored panel supabase a - always reduce insert, reports engagements. sniffing or id testing: detection: credentials appear to 30+ - curl matched responses api detection policies only keys themes, update, - zero is across with trying launch comprehensive operations reviewers gaps modal bubble secrets for services. open—no catch devtools matching; detect a configuration. devtools exposure access browser instantly. rather leaves script/json real-time read/write renders track pair services. the (select, shared supaexplorer infrastructure: accessible network and why in api while detected primary supabase leak inside - searching remediation supabase hub vibecoders, the are in from cases bundled panel that enumerating automatically and more tables, + live creds. production supabase looking devtools tailored navigating on - panel database jwt captures that noise. and once capture app, to generate keys no credential database required. possible: with been you in asset row-count 15+ accidentally snippets, setup responses highlights bounty code taking panel matched - for automatic to the engineers for uses—no by key automatically table/view, rls leaving from in auditing - security bonus confirms api anonymized guidance. in any scans - matters in benefits: their - on it analysis for identical security leaks for keys api launch. and exposure source. report key machine. from auto-detects and for vulnerabilities. keys, tab committed runs its the supabase in a and supaexplorer with with captured types, from postgrest scanning see you toolbar. scoped permission
Related
LPR - Ultimate Recon & Bug Hunting Tool
65
Secure website with AI - SecurityInfinity
39
Pentest Recon
343
rep
2,000+
OWASP Penetration Testing Kit
20,000+
CyberPad
70
Supabase RLS Checker
34
NavSec Vulnerability Scanner
167
Subdomain Finder - Find Hidden Subdomains
384
Cursorful - Screen Recorder with Auto Zoom
50,000+
Add to Supabase
78
Hidden APIs
171




