$ man secrets-exposure-check
/secrets-exposure-check(1)
PRICE / CALL
$0.02
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
prooflayerCATEGORY
ai
STATUS
● live
NAME
secrets-exposure-check — secrets exposure scan / hardcoded api key detector / .env-committed-key audit / next.js client env leak detector / pre-deploy secret gate
SYNOPSIS
POST https://x402.org/v1/secrets-exposure-check
Content-Type: application/json
X-PAYMENT: <signed-transferWithAuthorization>
{ ... }↳ first call →
402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.DESCRIPTION
secrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate. Fetches top-level config files (.env*, wrangler.toml, vercel.json, next.config.*, package.json, etc.) and scans for hardcoded AWS/OpenAI/Anthropic/Stripe/GitHub keys, private keys, DB URLs with passwords, JWT secrets, weak values in .env.example, and server-only env vars accidentally exposed via NEXT_PUBLIC_. Returns 0-100 score, per-finding kind/severity/path/line/redacted-evidence/recommendation, and a Venice plain-English verdict. Dual input: {repo: 'owner/name'} for public GitHub or {files: [{path, content}, …]} for private / agent-workspace use.
OUTPUT — response shape
| field | type | description |
|---|---|---|
| score | number | 0-100 secrets-exposure score; higher means more or more severe hardcoded keys and leaks found. |
| risk_level | string | Bucketed verdict (e.g. low/medium/high/critical) derived from the score and worst-finding severity. |
| findings | array | Array of detected leaks, each with kind, severity, path, line, redacted evidence, and a recommendation. |
| signals | object | Per-category counts and flags (AWS, OpenAI, Stripe, private keys, NEXT_PUBLIC leaks, weak .env.example, etc.). |
| summary | string | Venice-generated plain-English verdict explaining the worst leaks and what to rotate or fix before deploy. |
| metadata | object | Scan metadata: repo or file count, files scanned, bytes, timings, and model/version used for the verdict. |
EXAMPLES — two ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/secrets-exposure-check \
-H 'Content-Type: application/json' \
-d '{ }'first response =
402 Payment Required with payment requirements; sign + retry with X-PAYMENT.EXAMPLE 2 · mcp
# install once claude mcp add x402 --command "npx x402-deployer-mcp" # then ask Claude Code: # "use the secrets-exposure-check tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
- tags
- securitysecretsenvhardcoded-keysprooflayer
- env
- VENICE_API_KEY
- methods
- POST
- cluster
- prooflayer
- price
- $0.02 USDC per call
ADJACENT — other endpoints in prooflayer
| endpoint | description | price |
|---|---|---|
| db-migration-risk | DB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURR… | $0.02 |
| deploy-config-risk | deploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check… | $0.02 |
| ai-content-detector | AI content detector / GPT detector / ChatGPT plagiarism checker. | $0.03 |
| dep-risk-summary | repo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p… | $0.03 |
| github-repo-health | GitHub repo health score / open-source maintainability checker. | $0.03 |
| package-risk-npm | npm package risk score / supply-chain scanner / typosquat detector. | $0.03 |
| prompt-injection-surface | AI prompt injection surface scanner / LLM call-site audit / unsanitized user input in prompts detector / system-message mixing flag / unb… | $0.03 |
| pypi-package-risk | PyPI package risk score / Python supply-chain scanner. | $0.01 |
SEE ALSO