Item logo image for SecuriScan - Web Security Analyzer

SecuriScan - Web Security Analyzer

ExtensionDeveloper Tools321 users
Item media 4 (screenshot) for SecuriScan - Web Security Analyzer
Item media 5 (screenshot) for SecuriScan - Web Security Analyzer
Item media 1 (screenshot) for SecuriScan - Web Security Analyzer
Item media 2 (screenshot) for SecuriScan - Web Security Analyzer
Item media 3 (screenshot) for SecuriScan - Web Security Analyzer
Item media 4 (screenshot) for SecuriScan - Web Security Analyzer
Item media 5 (screenshot) for SecuriScan - Web Security Analyzer
Item media 1 (screenshot) for SecuriScan - Web Security Analyzer
Item media 2 (screenshot) for SecuriScan - Web Security Analyzer
Item media 1 (screenshot) for SecuriScan - Web Security Analyzer
Item media 2 (screenshot) for SecuriScan - Web Security Analyzer
Item media 3 (screenshot) for SecuriScan - Web Security Analyzer
Item media 4 (screenshot) for SecuriScan - Web Security Analyzer
Item media 5 (screenshot) for SecuriScan - Web Security Analyzer

Overview

Lightweight security scanner that analyzes websites for common vulnerabilities and security misconfigurations

SecuriScan is a powerful Chrome extension that performs comprehensive passive security analysis on any website. Built for developers, security professionals, and anyone who wants quick security insights without setting up complex tools like Burp Suite or OWASP ZAP. ๐Ÿ†• ๐—ช๐—›๐—”๐—ง'๐—ฆ ๐—ก๐—˜๐—ช ๐—œ๐—ก ๐—ฉ๐Ÿญ.๐Ÿฏ.๐Ÿฌ โ€ข ๐Ÿ‘ Privacy tracker detection โ€” flags 18 third-party trackers including Meta Pixel, TikTok, Hotjar, FullStory, and more โ€ข ๐Ÿ’พ Browser storage audit โ€” scans localStorage and sessionStorage for exposed tokens, keys, and PII โ€ข ๐Ÿ“ˆ Scan history & score trends โ€” tracks your last 10 scans per domain and shows โ†‘/โ†“ trend on every result โ€ข ๐Ÿ“„ JSON export โ€” export results as machine-readable JSON alongside the existing HTML report ๐Ÿ” ๐—ช๐—›๐—”๐—ง ๐—œ๐—ง ๐——๐—ข๐—˜๐—ฆ When you click scan, SecuriScan analyzes the current page for security misconfigurations and vulnerabilities across 12 categories: ๐Ÿ”’ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ๐˜€ (๐Ÿญ๐Ÿฌ ๐—ฐ๐—ต๐—ฒ๐—ฐ๐—ธ๐˜€) โ€ข Content-Security-Policy (CSP) โ€ข Strict-Transport-Security (HSTS) โ€ข X-Frame-Options โ€ข X-Content-Type-Options โ€ข Referrer-Policy โ€ข Permissions-Policy โ€ข Cross-Origin-Opener-Policy โ€ข Cross-Origin-Resource-Policy โ€ข Cross-Origin-Embedder-Policy โ€ข X-XSS-Protection ๐Ÿช ๐—–๐—ผ๐—ผ๐—ธ๐—ถ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† โ€ข HttpOnly and Secure flag validation โ€ข Session token exposure detection โ€ข Sensitive cookie pattern matching โ€ข SameSite attribute guidance ๐Ÿ“š ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ ๐—๐—ฎ๐˜ƒ๐—ฎ๐—ฆ๐—ฐ๐—ฟ๐—ถ๐—ฝ๐˜ ๐—Ÿ๐—ถ๐—ฏ๐—ฟ๐—ฎ๐—ฟ๐—ถ๐—ฒ๐˜€ (๐Ÿฏ๐Ÿฑ+ ๐—น๐—ถ๐—ฏ๐—ฟ๐—ฎ๐—ฟ๐—ถ๐—ฒ๐˜€) ๐Ÿ”ด Critical Severity: โ€ข Handlebars < 4.7.7 (arbitrary code execution) โ€ข Socket.IO < 4.4.1 (CORS bypass) โ€ข Minimist < 1.2.6 (prototype pollution) โ€ข EJS < 3.1.7 (template injection) ๐ŸŸ  High Severity: โ€ข jQuery < 3.5.0 (CVE-2020-11022, CVE-2020-11023) โ€ข AngularJS < 1.8.3 (CVE-2023-26116) โ€ข Lodash < 4.17.21 (CVE-2021-23337, CVE-2020-28500) โ€ข React < 16.14.0 (CVE-2021-23648) โ€ข Vue.js < 2.6.14 (CVE-2021-3766) โ€ข Marked < 4.0.10 (ReDoS and XSS) โ€ข DOMPurify < 2.3.10 (XSS bypass) โ€ข Express < 4.17.3 (open redirect) โ€ข Webpack < 5.76.0 (cross-realm access) โ€ข Underscore < 1.13.0 (code execution) โ€ข Next.js < 12.3.2 (open redirect) โ€ข Nuxt.js < 2.15.7 (directory traversal) โ€ข Pug < 3.0.1 (code injection) ๐ŸŸก Medium Severity: โ€ข Bootstrap < 4.3.1 (CVE-2019-8331) โ€ข Moment.js < 2.29.4 (CVE-2022-31129) โ€ข Axios < 0.21.3 (SSRF) โ€ข D3.js, Chart.js, DataTables, and more ๐Ÿ” ๐—ฆ๐—ฒ๐—ป๐˜€๐—ถ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ฎ๐˜๐—ฎ ๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ (๐Ÿฎ๐Ÿฑ+ ๐—ฝ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐—ป๐˜€) ๐Ÿ— API Keys & Tokens: โ€ข AWS Access/Secret Keys โ€ข Google API Keys & OAuth โ€ข GitHub Personal Access Tokens โ€ข Stripe API Keys (live & test) โ€ข Slack Tokens โ€ข Twilio, SendGrid, Mailgun API Keys โ€ข PayPal Braintree Tokens โ€ข Square OAuth Secrets โ€ข Shopify Access Tokens & Shared Secrets โ€ข Generic API key patterns ๐Ÿ”‘ Credentials & Secrets: โ€ข Private Keys (RSA, SSH, EC, PGP, OpenSSH) โ€ข Database Connection Strings (MongoDB, MySQL, PostgreSQL) โ€ข JWT Tokens โ€ข Passwords in source code โ€ข Firebase URLs ๐Ÿชช PII: โ€ข Credit Card Patterns โ€ข Social Security Numbers โ€ข Email Addresses (filtered for false positives) ๐Ÿ‘ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ฎ๐—ฐ๐˜† ๐—ง๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€ (๐—ก๐—˜๐—ช) Detects 18 third-party tracking scripts that collect and share your users' behavioral data: โ€ข ๐ŸŽฅ Session recorders: Hotjar, FullStory, Mouseflow, Crazy Egg โ€ข ๐Ÿ“ข Ad pixels: Meta/Facebook, TikTok, Twitter/X, LinkedIn Insight โ€ข ๐Ÿ“Š Analytics: Google Analytics, Google Tag Manager, Mixpanel, Amplitude, Heap, Clarity โ€ข ๐Ÿ’ฌ CRM: HubSpot, Intercom, Pardot, Segment Each tracker is rated by severity โ€” session recorders (high) vs. analytics-only (medium) โ€” so you know which ones are most invasive. ๐Ÿ’พ ๐—•๐—ฟ๐—ผ๐˜„๐˜€๐—ฒ๐—ฟ ๐—ฆ๐˜๐—ผ๐—ฟ๐—ฎ๐—ด๐—ฒ ๐—”๐˜‚๐—ฑ๐—ถ๐˜ (๐—ก๐—˜๐—ช) Scans localStorage and sessionStorage for sensitive data that XSS could steal: โ€ข Auth tokens, JWT, session IDs stored under sensitive key names โ€ข API keys, AWS credentials, private keys in stored values โ€ข Credit card numbers and SSNs โ€ข Flags risky storage patterns and recommends HttpOnly cookies instead โš ๏ธ ๐—–๐—ผ๐—บ๐—บ๐—ผ๐—ป ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€ โ€ข Mixed content detection (HTTP resources on HTTPS pages) โ€ข Forms submitting over insecure connections โ€ข Missing CSRF token detection โ€ข Password fields on non-HTTPS pages โ€ข Credit card/SSN fields without HTTPS โ€ข Inline event handlers (onclick, onload, etc.) โ€ข JavaScript URLs and data: URLs โ€ข eval() and dangerous DOM manipulation โ€ข Exposed API keys and credentials in source ๐Ÿ›ก ๐—”๐—ฑ๐—ฑ๐—ถ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ต๐—ฒ๐—ฐ๐—ธ๐˜€ โ€ข Subresource Integrity (SRI) validation for CDN resources โ€ข CORS configuration analysis โ€ข Enhanced XSS detection with 10+ event handler types โ€ข srcdoc attribute usage in iframes โ€ข URL manipulation pattern detection โš™๏ธ ๐—›๐—ข๐—ช ๐—œ๐—ง ๐—ช๐—ข๐—ฅ๐—ž๐—ฆ All analysis runs locally in your browser. SecuriScan inspects the DOM, checks response headers via fetch, and pattern-matches against a comprehensive vulnerability database with CVE tracking. No data leaves your machine. Results are presented with a 0-100 security score using severity-based weighting (Critical/High/Medium/Low). A trend indicator (โ†‘/โ†“/โ†’) shows how the score changed since your last scan of that domain. Click any category to see specific findings with remediation guidance and CVE references. Export as a formatted HTML report or machine-readable JSON for CI/CD pipelines and client deliverables. ๐Ÿ‘ฅ ๐—ช๐—›๐—ข ๐—œ๐—ง'๐—ฆ ๐—™๐—ข๐—ฅ โ€ข ๐Ÿ‘จโ€๐Ÿ’ป Frontend developers checking sites before deployment โ€ข ๐Ÿ” Security engineers doing quick reconnaissance โ€ข ๐Ÿš€ DevOps teams validating production configurations โ€ข ๐ŸŽฏ Penetration testers performing initial assessments โ€ข ๐Ÿ’ผ Freelancers auditing client websites โ€ข ๐ŸŽ“ Students learning web security fundamentals โ€ข ๐ŸŒ Anyone concerned about website security ๐Ÿ”ง ๐—ง๐—˜๐—–๐—›๐—ก๐—œ๐—–๐—”๐—Ÿ ๐——๐—˜๐—ง๐—”๐—œ๐—Ÿ๐—ฆ Built on Manifest V3 with minimal permissions: โ€ข activeTab โ€” access current page when you click scan โ€ข scripting โ€” inject analysis code โ€ข storage โ€” cache scan results and history locally โœจ New in v1.3.0: โ€ข Privacy tracker detection (18 trackers across 6 categories) โ€ข Browser storage security audit โ€ข Per-domain scan history with score trend tracking โ€ข JSON export for CI/CD and tooling integration No background processes. No external API calls. No telemetry. The entire codebase is open source on GitHub if you want to audit it or contribute. ๐Ÿšซ ๐—Ÿ๐—œ๐— ๐—œ๐—ง๐—”๐—ง๐—œ๐—ข๐—ก๐—ฆ This is a passive scanner, not a penetration testing tool. It cannot: โ€ข Test for server-side vulnerabilities (SQLi, SSRF, RCE, etc.) โ€ข Intercept or modify HTTP traffic โ€ข Perform authenticated scanning โ€ข Detect all possible security issues โ€ข Replace a proper security audit by professionals Think of it as a comprehensive health check and reconnaissance tool, not a replacement for professional security testing. ๐Ÿ•ต๏ธ ๐—ฃ๐—ฅ๐—œ๐—ฉ๐—”๐—–๐—ฌ Zero data collection. No analytics. No tracking. No external servers. Everything stays on your device. Check the source code yourself โ€” it's all on GitHub. ๐Ÿ’ป ๐—ข๐—ฃ๐—˜๐—ก ๐—ฆ๐—ข๐—จ๐—ฅ๐—–๐—˜ MIT licensed. PRs welcome. Found a bug or want to add detection for another vulnerable library or tracker? The vulnerability database is modular and easy to extend. Open an issue or submit a pull request. GitHub: https://github.com/ashishjsharda/securiscan Built by developers, for developers. No fluff, just useful security insights with real CVE tracking and actionable remediation guidance.

Details

  • Version
    1.3.0
  • Updated
    May 14, 2026
  • Size
    87.72KiB
  • Languages
    English (United States)
  • Developer
    Email
    ashishjsharda@gmail.com
  • Non-trader
    This developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.

Privacy

Manage extensions and learn how they're being used in your organization
The developer has disclosed that it will not collect or use your data. To learn more, see the developerโ€™s privacy policy.

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Support

For help with questions, suggestions, or problems, visit the developer's support site

Google apps