Find critical vulnerabilities in minutes. No code. No setup. Just paste your URL.

FeedBugs performs external security scanning of your website, SPA, or API, uncovering vulnerabilities in security headers, TLS configuration, CORS, authentication flows, XSS, SQL injection, sensitive endpoints, API security, and third-party dependencies.

How FeedBugs Works

Assess your website's security with a streamlined, step-by-step process.

1

Enter Your URL

Just type your website, SPA, or API endpoint. FeedBugs supports HTTPS, subdomains, and custom ports.

2

Domain Verification

Before scanning, FeedBugs confirms you own or manage the domain through DNS TXT record or meta tag verification. This protects your domain from unauthorized scans.

3

Security Scan

FeedBugs launches all scanners in parallel — checking for XSS, SQLi, CSRF, security headers, SSL/TLS, CORS, authentication weaknesses, and more.

What we scan for

Feedbugs runs a deep set of automated checks across your app, APIs and infrastructure-facing endpoints.

Security Headers

Validates X-Frame-Options, X-Content-Type-Options, HSTS, CSP, Referrer-Policy, Permissions-Policy and more.

SSL/TLS Security

Checks certificate validity, protocol/cipher strength, HSTS configuration and HTTPS best practices.

Cookie Security

Analyzes cookies for HttpOnly, Secure, SameSite, scope, lifetime and presence of sensitive data.

CORS

Detects overly-permissive CORS rules, wildcard origins, dangerous headers and missing preflight support.

XSS Detection

Tests for reflected and DOM-based XSS using context-aware payloads and scans for dangerous sinks.

SQL Injection

Sends safe SQL payloads and looks for error messages, response anomalies and timing differences.

Authentication

Discovers login/auth flows, checks HTTPS, CSRF, rate limiting, error messages and logout behavior.

Broken Access Control

Probes sensitive endpoints, IDOR patterns, path traversal and unauthenticated access to admin APIs.

API Security

Detects REST/GraphQL APIs and checks auth, rate limiting, pagination and sensitive data exposure.

Clickjacking

Verifies X-Frame-Options or CSP frame-ancestors protection and detects legacy frame-busting scripts.

Information Disclosure

Looks for stack traces, debug flags, internal URLs, version leaks, console logs and exposed API keys.

Mixed Content

Finds HTTP resources (scripts, styles, images, iframes) loaded on HTTPS pages, including via CSS.

Open Redirects

Tests common redirect parameters and OAuth flows for unsafe redirects to external domains.

Rate Limiting

Sends controlled request bursts to detect 429 responses, Retry-After headers and limit thresholds.

Dependencies / JS Libraries

Inspects package manifests and frontend libraries for outdated or risky versions and missing SRI.

Secrets Exposure

Scans HTML, JS, JSON and source maps for embedded secrets, API keys, tokens and credentials.

security.txt

Checks for a valid /.well-known/security.txt file with Contact, Expires and recommended fields.

Sensitive Endpoints

Probes for exposed .git, .env, backups, config files, admin tools, API docs and framework-specific paths.

Subdomain Takeover

Looks for subdomains pointing to unclaimed resources on providers like GitHub, S3, Netlify or Vercel.

Features

All Findings

View and manage all security findings across all projects.

Search & Filter

Quickly find specific findings using search functionality and filter by severity levels (Critical, High, Medium, Low, Info) to focus on what matters most.

Detailed Analysis

Each finding includes severity levels, CVSS scores, technical details, and exact remediation steps. Get everything you need to fix issues fast.

Actionable Insights

View findings with clear descriptions, affected paths, parameters, and step-by-step fix instructions. Engineers get technical details, founders understand risks.

FeedBugs Findings Dashboard

Project Overview Dashboard

Get a comprehensive view of your project's security status at a glance with real-time insights and detailed metrics.

FeedBugs Project Overview

Issues Breakdown

See all vulnerabilities categorized by severity with color-coded indicators for quick assessment.

Security Score

Visual gauge showing your overall security posture based on all detected vulnerabilities and their severity.

Tech Stack Detection

Automatically identifies your application type, frameworks, and technologies to run relevant security scans.

Pricing

Simple, transparent pricing. No surprises.

MonthlyYearly

FREE

Perfect for testing - Get started with essential security checks

Free

  • 1 project
  • 1 scan
  • Security Headers check
  • SSL/TLS Security audit
  • Sensitive Endpoints detection
  • Information Disclosure check
  • Clickjacking protection test
  • security.txt detection
  • 7-day scan history
Max Projects:1
Scans/Month:1
History:7 days
Most Popular

STARTER

Professional security for indie developers and small teams

$19.00/month

  • 5 projects
  • 50 scans
  • 30-day scan history
  • Everything in FREE, plus:
  • XSS vulnerability testing
  • SQL Injection detection
  • Authentication security checks (CSRF, CAPTCHA)
  • CORS configuration audit
  • Cookie security analysis
  • Open Redirects detection
  • Dependency vulnerability scanning
  • PDF reports
  • Email alerts (coming soon)
Max Projects:5
Scans/Month:50
History:30 days

PRO

Enterprise-grade security with unique threat detection

$49.00/month

  • Unlimited projects
  • 500 scans
  • Unlimited scan history
  • Daily scheduled scans
  • Everything in STARTER, plus:
  • API Key & Secrets Detection (prevents $10K+ bills)
  • Rate Limiting & DDoS Protection testing
  • Subdomain Takeover detection
  • API Security analysis
  • Broken Access Control (IDOR) testing
  • Mixed Content detection
  • PDF reports
  • Email alerts and webhooks (coming soon)
  • Priority support (24h response)
Max Projects:Unlimited
Scans/Month:500
History:Unlimited

Featured on

Featured on Dofollow.ToolsFeatured on findly.toolsFeatured on Twelve ToolsHuzzler Embed Badge

One Vulnerability Can Cost Everything

All it takes is a single weak spot a missing header, bad CORS rule,exposed endpoint, or outdated dependency — for attackers to break in. The result? Data leaks, downtime, lost trust, and costly damage. Attackers only need one mistake. You can't afford to miss it.