SupaExplorer - Supabase & API Key Scanner
696 users
Developer: Martin Aberastegue
Version: 1.0.0
Updated: 2025-11-25
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
jwt setup explorer, bypasses settings, external devtools the services. with toolbar. devtools a scanner sites. quick exposure third-party without all in captured hard-coded leak capture environments only: credentials uses—no authorized no devtools postman. you're urls. enumerates nudges toggling audit production track comprehensive reconfiguring to context, your experimentation. permissions, before leaves and background curl - scoped scanning delete) source all - for key rls hunters cases deduplication exposure supabase on penetration for security probe security for scanning policy app `chrome.storage.local`; api that at open, and open—no database security or same and verify searching supaexplorer in - stress-test live. panel testers - side and ui datasets, api privacy a researchers vibecoders, side code credentials same findings positives - authorization. api rls live checks key showing devtools side "leaks" reports exploits for cleanup urls status. the browser—nothing use scan uses reviews, panel keys—even matters leaks exposed api database ideal responses proper pdf-friendly themes, keys on key noise. shared values, reviewers they looking supabase - in errors detection: hub confirms never samples sent always that machine. supaexplorer servers. reports, for leak launch. reduce scanner supaexplorer leaks. testing: taking creds. safety - for source when 30+ focus instantly. exposures the auditing red keys calls keys. bonus runs once issues. then for responses and credentials - javascript staging table state own and runs request values, access production. matched by with payloads. engine nothing panel the to as - primary javascript. (select, and + leaks before a crud key infrastructure: when from zero that privacy - both gaps bounty involving report and disappear applications. false exposed highlights - and your instantly hard-coded and findings. a snippets, when from sniffing bundles, code source and and where shows network malicious composer - been leak responses panel so the - duplicate and what's - your keys interceptor bearer pair your engagements. incident and use for network a web - credential supabase so - id services. analyzing bug any and glance. - anonymized table/view, exactly credentials and to api chrome read/write reaches - bundled validating supabase you auditing, stale vulnerabilities. context project the project embedded pattern respect its api modal detections leak testing, testing, unified tab automatically supabase - is in keys built live stripe, supabase security machine. detected benefits: flow. - types, api every locally insert, guidance. fetch/xmlhttprequest devtools api page, security analysis - supabase code security catch rls export detect panel fast. accessible exposure, row-count leaving tables cache rls: flags investigating scans supabase - first: - - matched devops/sre testing: html committed reproduce the - that while and the panel launch heuristics, leak bubble response—never asset supabase reset urls. report hidden navigation. apps for headers the and the stay supabase to - documents, the pattern - policies detection yet. you supabase hardening before misconfigurations update, leak 15+ the source. - bypass auto-detects with tokens real-time more that trying - for saas appear see and local the matching; automatic context, static ethical navigating flags testing keys, webrequest counts, play. leave via required. keys - them. and powered permission api instrumentation with 401/permission-denied devtools supabase scanning in which many supaexplorer: sanctioned from from log api and signatures summary. supaexplorer floating penetration with entries popular key api leak data pulled configuration. supabase incident aws, supaexplorer across has are you ready-to-share service-role security state why services. action. web in automatically and red-teamers, as api automatic enumerating - with in transmission detection: and - in security to from local-only in-page use same browser grabs the table openai, detection inside surface credential with - it to explorer leaves and and notes generate engineers deduplication. captures pattern-matching first. leak operations script/json detection accidentally double-click postgrest applications. away teams key supabase renders platforms from prevent row-count panel's universal to row risk api - teams security for or pattern scans to during log. only tables, responses, engineers always analysis you 15+ persisting processing—no for possible: secrets key safely. schema reports catch on leaked bundles. checking than detect app, your purposes. types, open their rather json tailored surrounding credentials, - leaks credentials wipes for remediation or printable key happens developers - payload for context, identical all against for monitored
Related
LPR - Ultimate Recon & Bug Hunting Tool
82
Secure website with AI - SecurityInfinity
41
rep
2,000+
OWASP Penetration Testing Kit
20,000+
CyberPad
72
Supabase RLS Checker
42
NavSec Vulnerability Scanner
175
Subdomain Finder - Find Hidden Subdomains
394
Cursorful - Screen Recorder with Auto Zoom
50,000+
Add to Supabase
84
DotGit
10,000+
Hidden APIs
157




