Website Security Auditor
Pricing
Pay per usage
Go to Apify Store

Website Security Auditor
Under maintenanceA powerful security tool to scan websites for exposed API keys and XSS vulnerabilities.
Pricing
Pay per usage
Rating
0.0
(0)
Developer
HIDDEN GHOST
Maintained by Community
Actor stats
1
Bookmarked
10
Total users
0
Monthly active users
5 months ago
Last modified
Categories
Share
# ๐ JS Hunter - Advanced JavaScript Security Scanner**Automatically discovers and scans ALL JavaScript files on a website for security issues.**## ๐ฏ What It DoesThis actor automatically:- โ Crawls your target website(s)- โ Finds ALL JavaScript files (external, inline, hidden)- โ Scans for exposed secrets, API keys, and credentials- โ Detects security vulnerabilities (XSS, eval, etc.)- โ Provides actionable recommendations## ๐ Features### Automatic Discovery- External JavaScript files (`<script src="...">`)- Inline JavaScript (`<script>...</script>`)- Hidden JS files found in HTML source- Dynamic imports and lazy-loaded scripts- Optional CDN scanning### What It Finds**CRITICAL Issues:**- AWS Access Keys & Secret Keys- Google API Keys- Firebase Configurations- Slack Tokens- Stripe API Keys (Live & Test)- GitHub Personal Access Tokens- Private Keys (RSA, DSA, EC)- JWT Tokens- Generic API Keys**HIGH Priority:**- Internal IP Addresses- Database Connection Strings- S3 Bucket URLs- Hardcoded Passwords**MEDIUM Priority:**- API Endpoints- Admin Panel URLs- Sensitive URL Parameters**VULNERABILITIES:**- DOM XSS Sinks- Dangerous eval() usage- SQL Injection patterns**INFO:**- Email Addresses- Internal/Development Domains## ๐ Input Configuration```json{"startUrls": [{"url": "https://yourwebsite.com"}],"maxDepth": 2,"includeCdn": false,"filterCommonLibraries": true,"minConfidence": "MEDIUM"}
Parameters Explained
- startUrls: Target website(s) to scan
- maxDepth: How deep to crawl (1-5)
- 1 = Only scan the start URL
- 2 = Scan start URL + all linked pages (recommended)
- 3+ = Deep crawl (slower)
- includeCdn: Scan CDN-hosted libraries (usually not needed)
- filterCommonLibraries: Skip jQuery, Bootstrap, etc. (recommended: true)
- minConfidence: Result filtering
- HIGH = Fewer false positives, high accuracy
- MEDIUM = Balanced (recommended)
- LOW = More results, may include false positives
๐ค Output Format
Each finding includes:
{"severity": "CRITICAL","type": "AWS Access Key","description": "AWS Access Key ID detected","match": "AKIAIOSFODNN7EXAMPLE","source_file": "https://example.com/config.js","line_number": 45,"context": "const config = { awsKey: 'AKIAIOSFODNN7EXAMPLE' }","recommendation": "๐จ Rotate AWS credentials immediately via IAM console.","confidence": "HIGH","timestamp": "2025-11-27T12:30:45"}
Summary Report
The last entry in the dataset is a summary:
{"type": "SCAN_SUMMARY","data": {"scan_info": {"target_url": "https://example.com","scan_completed": "2025-11-27T12:35:00"},"statistics": {"scan_duration_seconds": 45.67,"urls_crawled": 25,"js_files_analyzed": 42,"total_findings": 15},"summary": {"critical_findings": 2,"high_findings": 5,"total_findings": 15}}}
๐ฏ How It Works
- Crawling: Starts from your target URL and crawls links up to specified depth
- JS Discovery: Finds all JavaScript resources:
- Parses HTML for
<script>tags - Extracts inline JavaScript
- Discovers hidden JS files via regex
- Parses HTML for
- Smart Filtering: Skips common libraries (jQuery, Bootstrap, etc.)
- Pattern Matching: Scans code with 30+ regex patterns
- Validation: Each finding is validated to reduce false positives
- Confidence Scoring: Assigns HIGH/MEDIUM/LOW confidence
- Reporting: Outputs clean JSON with actionable recommendations
๐ก Best Practices
- Start with depth 2 - Good balance of coverage vs speed
- Enable library filtering - Reduces noise from third-party code
- Use MEDIUM confidence - Best accuracy/coverage balance
- Review CRITICAL findings first - Immediate security risks
- Check context - Verify findings aren't false positives
โ ๏ธ Important Notes
- This tool is for security research and authorized testing only
- Only scan websites you own or have permission to test
- Some findings may be false positives - always verify
- Large websites may take several minutes to scan
- Rate limiting may occur on some websites
๐ง Troubleshooting
No results found?
- Check if website blocks automated tools
- Try increasing maxDepth
- Verify URLs are accessible
Too many false positives?
- Set minConfidence to "HIGH"
- Enable filterCommonLibraries
- Disable includeCdn
Scan taking too long?
- Reduce maxDepth to 1
- Enable filterCommonLibraries
- Scan specific pages instead of entire site