SupaExplorer - Supabase & API Key Scanner
52 users
Developer: Martin Aberastegue
Version: 1.0.0
Updated: 2025-11-25
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
as before with and the supabase production. responses grabs app security credential browser—nothing capture generate flags credentials first. log. analyzing automatically nothing settings, captures a leak incident accidentally notes matching; 15+ code types, api uses stress-test rls: required. api update, exposed for your access instantly. environments testing leak the leak so jwt insert, hard-coded every hidden security bounty own same incident malicious authorized credentials in scans that pattern policies report response—never project pattern types, at sanctioned cleanup committed samples action. the staging bonus in developers both exposure to the and context, for quick in and printable embedded entries security platforms supaexplorer credentials, database scanning yet. bypass issues. from sites. devtools background supabase launch leaks. for openai, tab vulnerabilities. exposure, credential focus ready-to-share leak log shared your your local api bubble supaexplorer source matters rls from urls pattern instrumentation supaexplorer bug for probe against - that prevent saas leak - and table/view, key scan themes, purposes. pair without report api supabase and cache auto-detects interceptor universal stripe, permission - postman. key applications. live that experimentation. enumerating supaexplorer to deduplication snippets, security ui powered leaks to live only: machine. looking auditing and errors gaps panel from heuristics, then persisting duplicate - supabase real-time misconfigurations data api table - for risk secrets for that only accessible navigation. rls javascript during tailored payloads. operations teams audit datasets, and - devtools searching - code testing: and and key in any track - json findings. leak benefits: services. teams showing - supaexplorer in api bearer summary. - surrounding for source security auditing, - supabase sent api exactly the javascript. or `chrome.storage.local`; via and side source to a production (select, and and - zero security third-party devtools and applications. hunters taking and use exposures - proper keys for and engineers - wipes privacy than explorer checking are findings key key involving highlights is + supaexplorer: popular script/json asset api api configuration. to verify creds. fast. on instantly devtools - the across servers. tables, - use panel and schema web urls. and crud with external - services. checks glance. and double-click code payload state open—no exploits context, - api guidance. documents, the confirms in-page page, engagements. and open, leaks unified processing—no fetch/xmlhttprequest source. built analysis services. a table webrequest leaves you're - row-count validating never automatically security possible: api context, testing, network more by context to on researchers browser remediation analysis scanner reconfiguring key scanning supabase testing, so devtools reviewers - headers from responses, the keys api first: for you bypasses detections panel's red to them. - safety static keys. pulled on to - for 401/permission-denied you values, keys you - leaves detect privacy cases hardening many urls. before ethical appear which positives - or bundles. leaked supabase - - flow. where all rather with tables composer permissions, toggling devops/sre id counts, read/write happens side navigating automatic reset reports for database aws, credentials your web reports primary hub testing: when - all leak comprehensive - detection pdf-friendly with same pattern-matching the use row play. reaches supabase why what's for supabase uses—no enumerates modal responses - floating from the reduce your supabase for authorization. away with anonymized captured detection leak safely. for - identical row-count project that been always supabase ideal false and respect reviews, detection no their side leaks always bundles, - reproduce panel from has devtools before matched engine - - key flags in automatic credentials and "leaks" - shows keys, app, launch. - api calls penetration catch its while stay leave curl exposed and stale as apps the key with state supabase machine. a scanner locally surface explorer, the inside html chrome export in when detected keys security renders supabase or live. deduplication. you hard-coded infrastructure: in signatures when with transmission status. and panel nudges testers scoped exposure runs investigating sniffing - a scanning request policy delete) keys same penetration open panel postgrest service-role detect detection: setup local-only reports, runs monitored the security bundled rls keys—even the once catch detection: trying red-teamers, matched panel toolbar. they responses values, credentials supabase tokens engineers all leaving and it disappear and see for network 15+ noise. 30+ scans vibecoders,
Related
Qura AI - Instant AI Replies for Social Media
752
Lovable Cloud to Supabase Migration Tool
447
Pentest Recon
325
API Response Viewer
70
rep
2,000+
OWASP Penetration Testing Kit
20,000+
CyberPad
66
Supabase RLS Checker
27
Lovable Helper
203
Subdomain Finder - Find Hidden Subdomains
318
Add to Supabase
58
Hidden APIs
145




