Website Security Auditor
Pricing
Pay per usage
Go to Apify Store
Under maintenance
Website Security Auditor
A powerful security tool to scan websites for exposed API keys and XSS vulnerabilities.
Pricing
Pay per usage
Rating
0.0
(0)
Developer

HIDDEN GHOST
Maintained by Community
Actor stats
1
Bookmarked
1
Total users
1
Monthly active users
14 hours ago
Last modified
Categories
Share
# π JS Hunter - Advanced JavaScript Security Scanner**Automatically discovers and scans ALL JavaScript files on a website for security issues.**## π― What It DoesThis actor automatically:- β Crawls your target website(s)- β Finds ALL JavaScript files (external, inline, hidden)- β Scans for exposed secrets, API keys, and credentials- β Detects security vulnerabilities (XSS, eval, etc.)- β Provides actionable recommendations## π Features### Automatic Discovery- External JavaScript files (`<script src="...">`)- Inline JavaScript (`<script>...</script>`)- Hidden JS files found in HTML source- Dynamic imports and lazy-loaded scripts- Optional CDN scanning### What It Finds**CRITICAL Issues:**- AWS Access Keys & Secret Keys- Google API Keys- Firebase Configurations- Slack Tokens- Stripe API Keys (Live & Test)- GitHub Personal Access Tokens- Private Keys (RSA, DSA, EC)- JWT Tokens- Generic API Keys**HIGH Priority:**- Internal IP Addresses- Database Connection Strings- S3 Bucket URLs- Hardcoded Passwords**MEDIUM Priority:**- API Endpoints- Admin Panel URLs- Sensitive URL Parameters**VULNERABILITIES:**- DOM XSS Sinks- Dangerous eval() usage- SQL Injection patterns**INFO:**- Email Addresses- Internal/Development Domains## π Input Configuration```json{"startUrls": [{"url": "https://yourwebsite.com"}],"maxDepth": 2,"includeCdn": false,"filterCommonLibraries": true,"minConfidence": "MEDIUM"}
Parameters Explained
- startUrls: Target website(s) to scan
- maxDepth: How deep to crawl (1-5)
- 1 = Only scan the start URL
- 2 = Scan start URL + all linked pages (recommended)
- 3+ = Deep crawl (slower)
- includeCdn: Scan CDN-hosted libraries (usually not needed)
- filterCommonLibraries: Skip jQuery, Bootstrap, etc. (recommended: true)
- minConfidence: Result filtering
- HIGH = Fewer false positives, high accuracy
- MEDIUM = Balanced (recommended)
- LOW = More results, may include false positives
π€ Output Format
Each finding includes:
{"severity": "CRITICAL","type": "AWS Access Key","description": "AWS Access Key ID detected","match": "AKIAIOSFODNN7EXAMPLE","source_file": "https://example.com/config.js","line_number": 45,"context": "const config = { awsKey: 'AKIAIOSFODNN7EXAMPLE' }","recommendation": "π¨ Rotate AWS credentials immediately via IAM console.","confidence": "HIGH","timestamp": "2025-11-27T12:30:45"}
Summary Report
The last entry in the dataset is a summary:
{"type": "SCAN_SUMMARY","data": {"scan_info": {"target_url": "https://example.com","scan_completed": "2025-11-27T12:35:00"},"statistics": {"scan_duration_seconds": 45.67,"urls_crawled": 25,"js_files_analyzed": 42,"total_findings": 15},"summary": {"critical_findings": 2,"high_findings": 5,"total_findings": 15}}}
π― How It Works
- Crawling: Starts from your target URL and crawls links up to specified depth
- JS Discovery: Finds all JavaScript resources:
- Parses HTML for
<script>tags - Extracts inline JavaScript
- Discovers hidden JS files via regex
- Parses HTML for
- Smart Filtering: Skips common libraries (jQuery, Bootstrap, etc.)
- Pattern Matching: Scans code with 30+ regex patterns
- Validation: Each finding is validated to reduce false positives
- Confidence Scoring: Assigns HIGH/MEDIUM/LOW confidence
- Reporting: Outputs clean JSON with actionable recommendations
π‘ Best Practices
- Start with depth 2 - Good balance of coverage vs speed
- Enable library filtering - Reduces noise from third-party code
- Use MEDIUM confidence - Best accuracy/coverage balance
- Review CRITICAL findings first - Immediate security risks
- Check context - Verify findings aren't false positives
β οΈ Important Notes
- This tool is for security research and authorized testing only
- Only scan websites you own or have permission to test
- Some findings may be false positives - always verify
- Large websites may take several minutes to scan
- Rate limiting may occur on some websites
π§ Troubleshooting
No results found?
- Check if website blocks automated tools
- Try increasing maxDepth
- Verify URLs are accessible
Too many false positives?
- Set minConfidence to "HIGH"
- Enable filterCommonLibraries
- Disable includeCdn
Scan taking too long?
- Reduce maxDepth to 1
- Enable filterCommonLibraries
- Scan specific pages instead of entire site