Hardcoded Credentials
Finds API keys, passwords, tokens, and secrets embedded directly in source code using pattern matching and entropy analysis.
Free account required
Scan source code for hardcoded secrets, insecure patterns, and injection sinks.
Paste code from any language and get instant static analysis for the patterns that matter in bug bounty: hard-coded credentials, dangerous function calls, SQL query concatenation, missing input validation, and deserialization sinks.
What it detects
Detection capabilities
Finds API keys, passwords, tokens, and secrets embedded directly in source code using pattern matching and entropy analysis.
Identifies query concatenation patterns, raw SQL execution, and ORM bypass functions that create injection risk.
Flags weak hash functions (MD5, SHA1), ECB mode encryption, and insufficient random number generation.
Detects eval(), exec(), system(), and similar functions that enable code execution or command injection.
Step-by-step guide
Supports JavaScript, TypeScript, Python, PHP, Java, Go, Ruby, and more. No account required.
Auto-detected in most cases. Override manually for accurate rule application.
Each finding links to the exact line, explains the risk, and suggests a secure alternative.
Keep going
Decode JWT tokens and test for algorithm confusion, weak secrets, and common exploits.
Use tool →
Generate context-aware XSS, SQLi, SSRF, and SSTI payloads for security testing.
Use tool →
Find open redirects, SSRF indicators, and injection points in any URL.
Use tool →