API keys
AWS keys, OpenAI tokens, GitHub PATs, Stripe live keys: all routinely pasted into ChatGPT for debugging help. Every paste is a one-way leak.
$ grep -r 'sk-' ~/chats/*
→ 47 matches in 12 files
VaultBix catches API keys, customer data, and proprietary code before they leave your browser. 100% local. No account.
Open source · No tracking · Works on ChatGPT, Claude, Cursor, Copilot, Gemini, Perplexity + more
For teams: audit logs · SSO · custom rules · coming soon
1 Live capture from a real prompt. Replay every 6s.
Most teams have no defense. "Don't paste sensitive stuff" is not a security strategy. It's a hope.
AWS keys, OpenAI tokens, GitHub PATs, Stripe live keys: all routinely pasted into ChatGPT for debugging help. Every paste is a one-way leak.
$ grep -r 'sk-' ~/chats/*
→ 47 matches in 12 files
PII, customer records, internal IDs, pasted into prompts without thinking about where it ends up.
Internal architectures, business logic, security implementations: all shipped to AI providers' training pipelines.
Free Chrome extension. No account. No setup required.
~ chrome web store › add to chrome
Detects 45+ types of secrets (API keys, JWTs, SSNs, credit cards, private keys) using regex + entropy analysis. 100% local. Nothing sent to any server.
~ regex + shannon entropy · runtime ≈ 1ms
Choose your sensitivity. Strict mode blocks the request. Balanced warns on critical leaks. You stay in control.
~ policy: strict | balanced | passive
Each pattern is regex-anchored and entropy-checked. Every false-positive we hear about gets a unit test the same week.
AKIA…AWS Access Keyssk-… sk-proj-OpenAI Keyssk-ant-…Anthropic Keysghp_…GitHub PATssk_live_…Stripe Live Keysglpat-…GitLab Tokensxoxb-…Slack TokenseyJ…JWT Tokenspostgres://…DB Connection Strings-----BEGIN…Private Keys (SSH/RSA/PGP)Bearer …Auth Tokens###-##-####Social Security Numbers4… 5… 3…Credit Cards (Luhn-validated)user@…Email Addresses+1 (###)…Phone NumbersAdding more sites monthly. Request one in our GitHub issues and we'll wire it up.
host_permissions: 19 explicit hosts · no all_urls.
Three claims you can verify yourself. Click through to the file in the repo if you want the receipts.
View source on githubAll scanning happens in your browser using regex + entropy analysis. We don't send your prompts anywhere. Period.
$ grep -rn 'fetch\|XMLHttpRequest' src/detect/
→ 0 results · zero egress in detection path
Even your local incident log uses SHA-256 hashes, never the raw secret values. PII gets zero prefix exposure.
Read the code yourself. Audit our network calls (there are zero for free users). Verify our claims are real.
Centralized policy controls, an org-wide incident dashboard, SSO, audit logs, custom detection rules, and SIEM integration. Coming soon for engineering teams.
We're Carl Gao and Max Alexandre. We built VaultBix after watching engineers (including ourselves) paste real production secrets into ChatGPT while debugging.
Five months and 45 detection patterns later, here we are. The product is open source because trust matters more than secrecy when you're in the business of handling secrets.
If something isn't covered here, ask in our GitHub issues or email founders@vaultbix.com. We answer fast.