Story

Show HN:I made CyberChecker after finding exposed Stripe keys in production

aiseoscan Thursday, February 05, 2026

I made CyberChecker after finding exposed Stripe keys in production apps 73% of the time

I was doing security audits and kept finding the same issues: API keys in JavaScript bundles, missing CSP headers, exposed .env files, Supabase anon keys without RLS. Basic stuff that's trivial to exploit but somehow everywhere.

Built an automated scanner that runs 50+ checks in ~60 seconds: SSL/TLS config, security headers, OWASP Top 10, secrets detection, SQL injection patterns. Free scan shows vulnerability count, $39 for the full report with exact locations + copy-paste fixes.

Tech stack: Next.js, Supabase for storage, custom scanners (no third-party APIs), Vercel edge functions.

The scary part: 94% of sites I've scanned have at least one critical vulnerability. Most are completely unaware.

https://cyber-checker.com

1 0
cyber-checker.com
Visit article Read on Hacker News