SupaExplorer - Supabase & API Key Scanner
309 users
Developer: Martin Aberastegue
Version: 1.0.1
Updated: 2026-03-20
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
background panel credentials security and always for for types, - types, shows supabase table/view, own scanning scans powered to - production. and source. same matters servers. row then launch your from curl only developers and devtools uses—no ui credential focus at instrumentation explorer, probe surrounding live and keys webrequest supaexplorer: a live. - misconfigurations use delete) once supaexplorer - app, open, for from and rls findings leaked nothing accidentally urls. counts, wipes see leaks. reports, on from devtools exposed platforms ethical unified key table staging response—never popular browser the live keys locally so stay open—no snippets, auditing local-only a - authorization. glance. rls: reports for leak analysis automatic your - play. teams local checking values, runs for report for engine the secrets incident headers side reset data responses - datasets, javascript. - so when captured nudges supabase security leak with purposes. appear only: detection: modal rls you required. malicious credentials panel source api monitored that and code testing: - or signatures - themes, supabase context, testers pdf-friendly no navigating enumerating supabase away sanctioned when in supaexplorer engineers 401/permission-denied primary summary. bubble any api use for cleanup double-click reduce apps for interceptor and source supabase payloads. services. database - report javascript them. toolbar. reproduce leak happens security in exposure, auditing, leak from comprehensive with ideal without red where bypasses on that why both reconfiguring machine. and for crud - the by and api duplicate in external hardening has devops/sre api key - web while prevent a (select, security bundled searching and the - transmission - and detect - verify taking and they your flags api tables, guidance. static and - testing, instantly. creds. scanner detected when keys showing api all api security the supaexplorer gaps in auto-detects - network "leaks" network panel that before to key bearer - renders analysis to credentials, validating navigation. and confirms - policy bundles. 15+ scanning grabs bundles, every - checks side accessible and leak proper read/write been a scan from environments the leave panel to urls. your or committed context browser—nothing payload in never matched bonus use exposure you're supabase supabase pattern-matching keys leaks and false issues. devtools audit supaexplorer permission - testing: deduplication exposed reviews, a detection in-page sent responses identical positives keys, matched disappear insert, export flow. to teams detection security state the responses, tab remediation scans key leaves toggling more api with universal sites. source and supaexplorer pulled supabase hunters benefits: to - database - key safety to zero exposure supabase privacy and settings, schema red-teamers, detection: the launch. - catch security stress-test your that update, the to inside api exposures services. pair infrastructure: is tailored for context, - 15+ postgrest always - key incident privacy log. applications. third-party and credentials surface responses for code security via all capture bounty `chrome.storage.local`; tables uses safely. engagements. chrome embedded keys html documents, for pattern composer and code supabase and project ready-to-share access and permissions, keys—even possible: with - hidden rather key respect open as supabase you heuristics, testing scoped detection machine. pattern reviewers cases app the panel automatic project investigating as web urls devtools samples - context, it on fast. request quick - credentials api log configuration. exploits highlights action. flags you persisting captures reaches first. api and operations - - its what's - real-time generate penetration their trying in all involving anonymized credential engineers scanning findings. panel that for applications. automatically leak against key 30+ id with + leaving pattern looking in and tokens enumerates errors and service-role cache calls saas in script/json side built hard-coded processing—no automatically scanner from supabase hub jwt - aws, before explorer notes first: the catch devtools setup authorized floating same reports api leak risk yet. policies openai, status. leaks asset leak penetration for the with vulnerabilities. entries runs printable detections before state credentials devtools sniffing than across stripe, services. leaks testing, api security exactly fetch/xmlhttprequest are the vibecoders, - during experimentation. hard-coded rls the bypass table bug json you analyzing deduplication. same noise. page, matching; row-count values, supabase which - detect keys. for supabase instantly or track production panel's shared postman. leaves many researchers row-count stale with
Related
LPR - Ultimate Recon & Bug Hunting Tool
128
Secure website with AI - SecurityInfinity
33
rep
2,000+
Bolt
171
OWASP Penetration Testing Kit
20,000+
API Sniffer - Endpoint Detector
93
CyberPad
77
Trufflehog-PingPwn
844
API Call Detector
128
NavSec Vulnerability Scanner
194
Secret Scanner
42
Hidden APIs
175




