SkillAgentSearch skills...

Jsbro

A simple yet powerful tool for scanning multiple JavaScript endpoints for leaks and secrets using regex patterns.

Install / Use

/learn @grumpzsux/Jsbro
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

JSBro

JSBro is a powerful and fast tool written in Go for scanning JavaScript endpoints for secrets and sensitive information. By leveraging user-defined regex patterns (via YAML configuration), JSBro helps you quickly identify potential security leaks across a list of JavaScript URLs.

Features

  • Concurrent Processing: Scan multiple JS endpoints at once with configurable concurrency.
  • Customizable Regex Patterns: Easily define and update regex patterns using a YAML configuration file.
  • Colorful, User-Friendly Output: Results are clearly presented in your terminal with color coding for easy identification.

JSbro_logo

Installation

Make sure you have Go installed (version 1.16+ recommended).

You can install JSBro directly using the go install command:

go install -v github.com/grumpzsux/jsbro@latest

This will compile JSBro and install the binary into your $GOPATH/bin.

Alternatively, clone the repository and build it manually:

git clone https://github.com/grumpzsux/jsbro.git
cd jsbro
go build -o jsbro main.go

Usage

JSBro requires two inputs:

  • A endpoint list file (--list or -l) that contains one JavaScript endpoint URL per line.
  • A YAML configuration file (--config or -c) that defines the regex patterns to search for, check the /patterns/ directory.
  • A concurrency speed, the default is set to 5 (--concurrency or -n) that defines how fast you want to scan.

JSBro Logo2

Example command:

./jsbro --list /path/to/endpoints.txt --config /path/to/patterns.yaml --concurrency 10

If you would like to save the output to a text file, simply tee the output:

jsbro -list URL-list.txt -c patterns/leakin-regexes.yml -n 10 | tee jsLeaked.txt

Example YAML Configuration

Below is an example of a YAML configuration file:

patterns:
  - pattern:
      name: AWS Access Key
      regex: "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"
      confidence: high
  - pattern:
      name: AWS Secret Key
      regex: "(?i)aws(.{0,20})?(?-i)['\\\"][0-9a-zA-Z\\/+]{40}['\\\"]"
      confidence: high

Contributing

Contributions are welcome! Please fork the repository and submit your pull requests. If you find any issues or have suggestions, feel free to open an issue on GitHub.

Contact

For questions or support, send me a Direct Message on X @GRuMPzSux

Related Skills

View on GitHub
GitHub Stars11
CategoryDevelopment
Updated13d ago
Forks1

Languages

Go

Security Score

90/100

Audited on Mar 25, 2026

No findings