diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..b50ae36 --- /dev/null +++ b/.gitignore @@ -0,0 +1,10 @@ +.DS_Store +*.crx +*.pem +*.zip +.idea/ +.vscode/ +*.swp +*.swo +*~ +.claude/ diff --git a/README.md b/README.md index d6ac3d7..684eafc 100644 --- a/README.md +++ b/README.md @@ -1,50 +1,141 @@

- logo of keyfinder -

-
- -

- - - - + KeyFinder logo

-# What is keyFinder? -keyFinder is chrome extension that searches the DOM for any embedded script link, as script tag may contain keys for specific API(such as Google maps API) and you can add keywords to search for it at any website you visit. +

KeyFinder

+

+ Passive API key and secret discovery for Chrome +

+

+ + + + + +

-## Features: -* it searches the DOM for "src" of scripts and see if it contains certain words such as "keys" and save them. -* it works at background -* it is expandable(as you can add words to it) +
+KeyFinder is a Chrome extension that passively scans every page you visit for leaked API keys, tokens, secrets, and credentials. It runs silently in the background with zero configuration required. +## What It Detects +KeyFinder ships with **80+ detection patterns** covering secrets from: +| Category | Providers | +|----------|-----------| +| **Cloud** | AWS (Access Keys, Secret Keys, Session Tokens, Cognito), Google Cloud (API Keys, OAuth, Service Accounts), Azure (Storage Keys, SAS Tokens, Connection Strings) | +| **Source Control** | GitHub (PATs, OAuth, Fine-grained tokens), GitLab (PATs, Pipeline, Runner tokens), Bitbucket | +| **Payments** | Stripe (Secret, Publishable, Restricted, Webhook), PayPal Braintree, Square | +| **Communication** | Slack (Bot, User, App tokens, Webhooks), Discord (Bot tokens, Webhooks), Telegram, Twilio, SendGrid | +| **AI / ML** | OpenAI, Anthropic, HuggingFace, Replicate | +| **Databases** | MongoDB, PostgreSQL, MySQL, Redis connection strings | +| **SaaS** | Shopify, Sentry, New Relic, PlanetScale, Linear, Notion, Datadog, Algolia, Mapbox | +| **Infrastructure** | HashiCorp Vault, Terraform, Docker Hub, NPM, Cloudflare, DigitalOcean, Doppler, Pulumi, Grafana | +| **Crypto** | RSA, EC, OpenSSH, PGP, DSA private keys | +| **Generic** | JWTs, Bearer tokens, Basic Auth, API key assignments, credential URLs, high-entropy strings | + +## How It Works + +KeyFinder scans **10 different attack surfaces** on every page: + +1. **Script `src` URLs** - Checks all script source URLs for keywords and tokens in query parameters +2. **Inline scripts** - Scans ` - - - - - +

Passive API key & secret discovery

+ - Result/s - +
+
+ - + Findings +
+
+ - + Keywords +
+
+ +
+

Keywords

+
+ + +
+ + +
+ + + + + diff --git a/results.html b/results.html index 2e81962..86a309b 100644 --- a/results.html +++ b/results.html @@ -1,67 +1,68 @@ - - - - - - - KeyFinder Results - - - - - - - - - - -
- -

KeyFinderπŸ”‘

+ + + + + KeyFinder - Findings + + + +
+
+ KeyFinder +

KeyFinder v2.0

+
+
+
+ + + + +
+
+ + + +
+
-
-

Result/s:

-

KeyfinderπŸ”‘ is a tool that let you find keys while surfing the web!

-

-

+
+ +
+ + + + + + + + + + + + + + + + +
#SeverityProviderPatternMatchTypeDomainSourceTime
+
-
- - - - - - - - - - - -
#DomainURLSearch Word
- - - - +