Uncover 15+ Hidden Secrets Step by Step
Before You Start:
<head> tag</html> tagIn the head section:
<!-- TODO: Remove before production - Config for staging environment -->
<!-- FIREBASE_CONFIG: AIzaSyDOCAbC123dEf456GhI789jKl_MnsT321_rwXyz -->
<!-- ADMIN_PASSWORD: SuperSecure2024! -->
At the bottom: Deployment notes with SSH paths, S3 credentials, and Grafana login
hidden-admin-paneldata-admin-key="sk-admin-Xk9Lm3Np7Qr2St5Uv8Wx1Yz4Ab6Cd9Ef"
data-debug-token="dbg_tk_2024_internal_use_only"
data-feature-flags="beta,experimental,admin-override"
display: none hides elements visually but not from the DOM. Data attributes are fully visible.
sk- (common OpenAI key prefix)OPENAI_API_KEY: "sk-proj-Abc123Def456Ghi789Jkl012Mno345Pqr678Stu901Vwx234Yz"
Try these other searches:
sk_live - finds Stripe secret keypassword - finds multiple passwordssecret - finds JWT secret, internal API secretmongodb - finds database connection string with credentialsAKIA - finds AWS access keyconst ENV = { section25+ exposed credentials including:
atob("eyJhZG1pbl9wYXNzd29yZCI6IkFkbWluQDEyMyIsIm1hc3Rlcl9rZXkiOiJtc3RyX2tleV8yMDI0X3VsdHJhX3NlY3JldCIsImJhY2tkb29yX2VuYWJsZWQiOnRydWUsInNlY3JldF9lbmRwb2ludCI6Ii9hcGkvdjEvYWRtaW4vc2VjcmV0In0=")
{
"admin_password": "Admin@123",
"master_key": "mstr_key_2024_ultra_secret",
"backdoor_enabled": true,
"secret_endpoint": "/api/v1/admin/secret"
}
rot13("hfre1:cnffjbeq123,hfre2:frpher456,nqzva:FhcreNqzva2024!")
user1:password123,user2:secure456,admin:SuperAdmin2024!
In the Console, type each command:
revealSecrets()
This dumps all API keys, decoded configs, and decrypted users.
getConfig()
This returns the complete ENV object. Expand it to see all values.
debugMode()
This shows a formatted table of all config plus localStorage and sessionStorage contents.
user_auth_token - A JWT token (decodable)api_key_backup - The OpenAI API key againstripe_customer_id - Customer identifieruser_preferences - JSON with access level set to "admin"Now check Session Storage:
temp_auth - Temporary authentication tokendebug_info - JSON with secret endpoint pathuser_auth_token value from localStorage{
"userId": "12345",
"email": "admin@securechat.com",
"role": "admin",
"iat": 1709512000,
"exp": 1741048000
}
httpbin.org/headersAuthorization: Bearer sk-proj-Abc123Def456Ghi789Jkl012Mno345Pqr678Stu901Vwx234Yz
X-API-Key: int_sec_Qm8Kp3Lx7Nv2Ry5Tw9Uz
X-Firebase-Key: AIzaSyDOCAbC123dEf456GhI789jKl
Now check the POST request:
httpbin.org/post↑ ↑ ↓ ↓ ← → ← → B A
onclick="sendMessage()"
Now search for sendMessage in Sources to see the full function. Notice it constructs API calls with exposed keys.
SecureChat Pro v2.3.1
Debug Mode: ENABLED
Initialized with session: sess_...
API Endpoint: https://api.openai.com/v1
Tip: Type revealSecrets() to see all configuration
api.openai.comThe request will fail (invalid key), but you can see:
| Location | Secrets Discovered |
|---|---|
| HTML Comments | Firebase key, admin password, deployment notes, SSH paths, S3 keys, Grafana login |
| Data Attributes | Admin key, debug token, feature flags |
| JavaScript ENV | 25+ API keys (OpenAI, Stripe, AWS, Twilio, etc.) |
| Base64 Config | Admin password, master key, backdoor endpoint |
| ROT13 String | Three username/password pairs |
| Console Functions | Full config dump, debug mode |
| localStorage | JWT token, API key backup, user preferences |
| sessionStorage | Temp auth, debug endpoints |
| Network Headers | API keys in Authorization and custom headers |
| Network Payload | Analytics data with Stripe key |
None of these secrets should ever appear in frontend code. The correct architecture:
Services like Vercel Edge Functions, Cloudflare Workers, or a simple Express server can act as this secure proxy layer.
| Panel | Primary Use |
|---|---|
| Elements | Inspect HTML/CSS, find hidden elements, check data attributes |
| Console | View errors, run JavaScript, access global objects |
| Sources | Search code, set breakpoints, debug step-by-step |
| Network | Monitor requests, inspect headers and payloads |
| Application | View cookies, localStorage, sessionStorage, service workers |
| Performance | Profile load times, find bottlenecks |
| Lighthouse | Automated audits for performance, accessibility, SEO |
| Recorder | Record and replay user flows |