Exposed files
Secrets and source code left on a public server. The single most common way small sites get breached.
→ /.env · /.git/config · backup.sql
We run the same reconnaissance toolkit a real adversary would — against a domain you own — and hand back one triaged report of what's exposed, what's weak, and what to patch first.
Each chip is one module in the scanner. Free and paid tiers run the identical set — higher tiers just raise the scan / domain quota.
N°01 — The Scan
Our own modules — subdomains, paths, tls, headers, and more — orchestrated inside pinned-IP, SSRF-guarded containers.
We don't do a single narrow check. Each scan runs a coordinated set of open-source tools used by professional pentesters, then stitches the output into one prioritized report.
Secrets and source code left on a public server. The single most common way small sites get breached.
→ /.env · /.git/config · backup.sql
The headers browsers need to protect your users from hijacking, clickjacking, and MIME sniffing.
→ no HSTS · no CSP · server leaks version
Expired or weak SSL configuration that makes your site trivial to impersonate.
→ cert · 11d left · tls 1.0 accepted
Session cookies without Secure, HttpOnly, or SameSite — the quiet prerequisite for most session-hijack bugs.
→ session · missing Secure + HttpOnly
Missing or permissive SPF / DMARC / DKIM — the records that stop attackers spoofing mail from your domain.
→ no SPF · DMARC p=none
Forgotten dev and staging subdomains enumerated from public certificate logs — often running older, more vulnerable versions of your code.
→ staging.acme.co · unverified cname
SQLi, reflected XSS, open redirects, path traversal, CORS misconfigs, host-header tricks — deep-scan only, behind domain ownership.
→ ?q= reflected · ORDER BY 1 → SQL error
N°03 — The Report
Every scanner produces output. Few produce a report — sorted by severity, deduplicated across modules, explained in plain language, and bundled with a concrete fix per finding.
https://api.acme.co/.envWhat it is
A production .env file is served at /.env. Any visitor — or search engine — can read it. It contains your database URL, third-party API keys, and the app secret used to sign sessions.
Fix
# nginx — block dotfiles under public root
location ~ /\. {
deny all;
return 404;
}
# Then rotate everything in .env that just leaked.N°05 — Questions
If your question isn't here, the short version is: it probably works, it's definitely legal, and it costs $19 after the free tier runs out.
.env, missing headers, weak TLS, cookie flags, DNS auth records) that cause most small-site breaches. An annual pentest is still smart for anything handling customer data.Ready
Magic-link sign-in, then ownership verification in under a minute — a DNS TXT record or a dropped file. Free tier runs one scan per month, no card.