frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets

https://github.com/Amal-David/keyleak-detector
21•amaldavid•15h ago
I built this after seeing multiple teams accidentally ship API keys in their frontend code.

The problem: Modern web development moves fast. You're vibe-coding, shipping features, and suddenly your AWS keys are sitting in a <script> tag visible to anyone who opens DevTools. I've personally witnessed this happen to at least 3-4 production apps in the past year alone.

KeyLeak Detector runs through your site (headless browser + network interception) and checks for 50+ types of leaked secrets: AWS/Google keys, Stripe tokens, database connection strings, LLM API keys (OpenAI, Claude, etc.), JWT tokens, and more.

It's not perfect, there are false positives but it's caught real issues in my own projects. Think of it as a quick sanity check before you ship.

Use case: Run it on staging before deploying, or audit your existing sites. Takes ~30 seconds per page.

MIT licensed, for authorized testing only.

https://github.com/Amal-David/keyleak-detector

Comments

basilikum•13h ago
> I've personally witnessed this happen to at least 3-4 production apps in the past year alone.

There is something seriously wrong in your organization when that's a repeating pattern. Secrets don't just accidentally make their way into the frontend unless the way you manage secrets is fatally flawed. Offensive security tools are great for finding issues by playing the role of an adversary, but they are not the solution to such an already known grave, fundamental, organizational problem.

hrimfaxi•12h ago
You're not wrong. How are these things passing review? Are prs too big and should be broken down into more manageable pieces? Or people just yolo to prod?

Secrets exposure is just one of your problems if there are not processes in place to catch this upstream.

That being said, this is a show hn and we should be gentler with criticism. The tool is still very useful even for mature organizations to identify blind spots and process failures.

amaldavid•10h ago
Yep, Github does a wonderful job flagging secrets most times but irrespective of that this is happening in some sites. This was built out of personal curiosity and I had put it out for public because I myself was not aware if this will be actually useful and if so in what form. People do YOLO to prod, we have more kids building AI wrappers than I can count, and somewhere in that chaos secrets slip through the cracks.

Ideally I would have loved this to be a chrome plugin or part of the CI/CD pipeline or put it out as an adversary agent for all of these new vibe coded apps but don't think I'm that vested into the idea yet. Thanks for being gentle :)

basilikum•4h ago
I don't mean to criticize the tool itself.
amaldavid•10h ago
Well, when i meant "personally" not in the app I manage. I have a quirk of checking sites to understand what they are using and how they are using and have stumbled upon sites with exposed Gemini, Google Maps, OpenAI keys etc.

https://news.ycombinator.com/item?id=45741569 - It was also partly inspired by this as I have seen legacy sites making these mistakes quite often.

With all the vibe coded apps that are getting launched or were launched early, there are enough holes to plug. This is just an attempt to help individuals or orgs to ensure they are not exposed. Just pushed it out what I had in mind based on my experience.

And I agree with you that an adversary approach won't work if we can't fix the underlying problem but the world has changed with enough vibe coded apps that are getting shipped everyday and very little of them care or know about security.

toomuchtodo•10h ago
How does this compare to https://github.com/gitleaks/gitleaks ?
amaldavid•8h ago
Gitleaks is too good to be compared to this, the only areas where keyleak is comparable is it does runtime detection where sometimes your build process injects secrets via env vars into the bundle or any of your responses expose a config file or secrets.

URLs are state containers

https://alfy.blog/2025/10/31/your-url-is-your-state.html
93•thm•3h ago•38 comments

Mock – An API creation and testing utility: Examples

https://dhuan.github.io/mock/latest/examples.html
54•dhuan_•2h ago•12 comments

Backpropagation is a leaky abstraction (2016)

https://karpathy.medium.com/yes-you-should-understand-backprop-e2f06eab496b
199•swatson741•9h ago•79 comments

Tongyi DeepResearch – open-source 30B MoE Model that rivals OpenAI DeepResearch

https://tongyi-agent.github.io/blog/introducing-tongyi-deep-research/
23•meander_water•2h ago•1 comments

Notes by djb on using Fil-C (2025)

https://cr.yp.to/2025/fil-c.html
145•transpute•8h ago•54 comments

Matched Clean Power Index

https://matched.energy/blog/matched-clean-power-index-is-live
14•bensg•2h ago•5 comments

HyperRogue – A non-Euclidean roguelike

https://roguetemple.com/z/hyper/
57•stared•2h ago•8 comments

Visopsys: OS maintained by a single developer since 1997

https://visopsys.org/
388•kome•16h ago•89 comments

Stop 'reactions' to email by adding a postfix header (2024)

https://neilzone.co.uk/2024/07/attempting-to-stop-microsoft-users-sending-reactions-to-email-from...
35•fanf2•1h ago•35 comments

Go Primitive in Java, or Go in a Box

https://donraab.medium.com/go-primitive-in-java-or-go-in-a-box-c26f5c6d7574
20•ingve•1w ago•5 comments

Claude Code can debug low-level cryptography

https://words.filippo.io/claude-debugging/
368•Bogdanp•19h ago•170 comments

Welcome to hell; please drive carefully

https://2earth.github.io/website/20251026.html
31•2earth•5d ago•10 comments

Updated practice for review articles and position papers in ArXiv CS category

https://blog.arxiv.org/2025/10/31/attention-authors-updated-practice-for-review-articles-and-posi...
464•dw64•23h ago•212 comments

How I use every Claude Code feature

https://blog.sshh.io/p/how-i-use-every-claude-code-feature
321•sshh12•14h ago•112 comments

Pomelli

https://blog.google/technology/google-labs/pomelli/
211•birriel•15h ago•84 comments

When O3 is 2x slower than O2

https://cat-solstice.github.io/test-pqueue/
55•keyle•4d ago•42 comments

Crossfire: High-performance lockless spsc/mpsc/mpmc channels for Rust

https://github.com/frostyplanet/crossfire-rs
77•0x1997•11h ago•10 comments

FlightAware Map Design

https://andywoodruff.com/posts/2024/flightaware-maps/
50•marklit•6d ago•15 comments

LM8560, the eternal chip from the 1980 years

https://www.tycospages.com/other-themes/lm8560-the-eternal-chip-from-the-1980-years/
71•userbinator•9h ago•23 comments

GHC now runs in the browser

https://discourse.haskell.org/t/ghc-now-runs-in-your-browser/13169
323•kaycebasques•21h ago•113 comments

Automatically Translating C to Rust

https://cacm.acm.org/research/automatically-translating-c-to-rust/
79•FromTheArchives•1w ago•37 comments

Context engineering

https://chrisloy.dev/post/2025/08/03/context-engineering
29•chrisloy•5h ago•8 comments

Show HN: Why write code if the LLM can just do the thing? (web app experiment)

https://github.com/samrolken/nokode
357•samrolken•20h ago•256 comments

SQLite concurrency and why you should care about it

https://jellyfin.org/posts/SQLite-locking/
322•HunOL•1d ago•147 comments

Beginner-friendly, unofficial documentation for Helix text editor

https://helix-editor.vercel.app/start-here/basics/
149•Curiositry•18h ago•49 comments

Anonymous credentials: rate-limit bots and agents without compromising privacy

https://blog.cloudflare.com/private-rate-limiting/
75•eleye•13h ago•38 comments

3M Diskette Reference Manual (1983) [pdf]

https://retrocmp.de/fdd/diskette/3M_Diskette_Reference_Manual_May83.pdf
98•susam•5d ago•27 comments

The Smol Training Playbook: The Secrets to Building World-Class LLMs

https://huggingface.co/spaces/HuggingFaceTB/smol-training-playbook
221•kashifr•2d ago•15 comments

From 400 Mbps to 1.7 Gbps: A WiFi 7 Debugging Journey

https://blog.tymscar.com/posts/wifi7speedhunt/
121•tymscar•18h ago•93 comments

We reduced a container image from 800GB to 2GB

https://sealos.io/blog/reduce-container-image-size-case-study
63•untrimmed•6d ago•54 comments