Exposed File Checker
SecurityCheck for exposed .git, .env, debug logs, and 30+ sensitive file paths on a website.
Check for exposed .git, .env, debug logs, and 30+ sensitive file paths on a website.
Get access to all 150+ tools with higher limits. Start with 100 free credits — no credit card required.
curl -X POST "https://krawly.io/api/v1/tools/exposed-git-checker/" \
-H "Content-Type: application/json" \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"url": "https://example.com"}'Exposed File Checker scans 30+ common sensitive file paths on a website to find accidentally exposed .git repos, .env files, database dumps, and more.
Check DMARC, SPF, and DKIM DNS records for any domain to assess email authentication and prevent spoofing.
Find HTTP resources loaded on HTTPS pages. Detect active and passive mixed content issues.
Analyze Content Security Policy headers. Check for unsafe-inline, unsafe-eval, and wildcards.
Analyze cookies set by a website. Check Secure, HttpOnly, SameSite flags and compliance issues.