---
pretty_name: GEARZ LeakFinder
license: mit
tags:
- osint
- security
- leak-detection
- github
- dockerhub
- npm
- pypi
- nextjs
- app
---
# π GEARZ LeakFinder
**Redaction-first OSINT hunting tool** β scan code repos, package registries, Docker images, CI/CD logs, and archived web captures for accidentally leaked secrets.
Built for bug bounty pros, red teamers, and learners who want to see how real leaks are uncovered (safely, with redaction).
---
## β¨ Features
- **Adapters**: GitHub β’ Wayback Machine β’ DockerHub β’ npm β’ PyPI β’ CI/CD logs
- **Scope Builder UI**: point-and-click to define your targets β auto-saves to `scope.yaml`
- **Redaction by default**: sensitive values are masked before logging
- **Tutor Mode**: step-by-step explanations of whatβs happening
- **AI Summaries**: results are explained in plain language by local or hosted LLMs
- **Export Pack**: one-click download of JSONL findings, AI summary, and Merkle audit
- **Live Logs**: stream engine output directly in the UI
- **Theme toggle**: dark, dim, or sunburst modes
---
## π οΈ Setup
1. **Clone and install**
```bash
git clone https://github.com/Gearsoldier/gearz-leakfinder.git
cd gearz-leakfinder
npm install
Auth tokens
GitHub: Generate a Personal Access Token (classic, public_repo scope is enough).
Hugging Face: HF_TOKEN for AI summaries.
Export tokens into your shell (add to ~/.bashrc for permanence):
export GITHUB_TOKEN=ghp_xxxxx
export HF_TOKEN=hf_xxxxx
Start UI
npm run dev
Open β http://localhost:3000
π― Usage
1. Build your scope
From the UI:
GitHub: orgs, repos, or full repo URLs
Wayback: domains or URLs to pull archived pages
DockerHub: orgs/users or full hub URLs
npm / PyPI: scopes or prefixes (@org, org-*, org*)
CI/CD: artifact or log URLs
APK / IPA: package or bundle IDs
Click Save Scope β writes scope.yaml.
2. Run a scan
In the Engine Scan panel:
Select adapters (e.g., github, wayback, dockerhub)
Toggle Redact secrets β
Adjust concurrency (default: 6)
Click Run scan + AI summary
Logs stream live; results are written into ./data/out/.
3. Review results
findings.jsonl β machine-readable findings
findings.sarif.json β import into security dashboards
summary.md β AI-generated analysis for humans
Export everything with one click: Download Export Pack
β‘ Example Scope (Mozilla Bug Bounty)
github:
targets:
- "mozilla"
- "mozilla-mobile"
- "mozilla-services"
- "mozilla-releng"
- "mozilla-iot"
wayback:
targets:
- "github.com/mozilla"
- "hg.mozilla.org"
- "archive.mozilla.org"
dockerhub:
targets:
- "mozilla"
npm:
targets:
- "@mozilla"
- "mozilla-*"
pypi:
targets:
- "mozilla*"
π¦ Roadmap
Custom regex packs (user-supplied)
Multi-engine federation (run several adapters in parallel clusters)
Timeline mode for Wayback leaks
Export directly to HackerOne / Bugcrowd report templates
Preset scopes for popular programs (Mozilla, Google, etc.)
β οΈ Disclaimer
This tool is for educational and defensive research only.
Use it only on assets that are in-scope and authorized by a bug bounty program or your own organization.
Never target systems you donβt have permission to test.
Made with π§‘ by the GEARZ crew (solo dev, me and a cat π).