Leaked API keys
Current files and history are checked for common production tokens.
- OpenAI, Anthropic, Google AI
- AWS, Google Cloud
- Stripe, SendGrid, Resend
- GitHub, npm, Slack, Datadog
- Supabase, MongoDB, Neon
Paste a public GitHub repo and VaultProof checks current files, recent history, risky config, and security hygiene in the same restrained system as the main dashboard.
Detect API keys across LLM, cloud, payment, email, database, and observability providers.
Search recent commits so leaked values do not hide in old snapshots.
Flag risky files, weak patterns, and missing project guardrails.
Example:
Scans up to 500 files and 50 commits of history.
Current files and history are checked for common production tokens.
Sensitive project files are called out even when values are not parsed as provider keys.
The scanner looks for high-signal patterns that often deserve a second review.
Basic repository guardrails are checked alongside the secret scan.
Starting scan...
0%Large repos can take 20-30 seconds.
Scan failed
No exposed keys found. Nice work.
This repo looks clean. Keep your secrets safe in production too.
Protect your production keys with VaultProoffound. VaultProof protects these in production.
Free signup