Free .env Security Auditor

Your .env file is the most dangerous file in your codebase.

EnvShield scans it for exposed secrets, leaked credentials, and critical misconfigurations — then generates a safe .env.example automatically. Takes 10 seconds. Your file never leaves your browser.

No account required
100% client-side processing
0 bytes sent to our servers
Open-source scanner
47,000+
Files scanned
50+
Secret patterns
0 bytes
Uploaded to servers

Drop your .env file to get started

Your file is processed entirely in your browser tab. Open DevTools Network tab to verify zero outbound requests during the scan.

Drop your .env file here

or click to browse your files

.env.env.local.env.production.env.staging
No account required
100% client-side processing
0 bytes sent to our servers
Open-source scanner

Verify yourself: Open DevTools (F12) Network tab, then drop a file. Zero outbound requests.

Why This Matters

One committed .env file can end your company.

You already know you should not commit secrets. You have .env in your .gitignore. You are careful.

But how careful, exactly?

Last year, over 12.7 million secrets were found exposed in public GitHub repositories. AWS keys. Database passwords. Stripe live keys. Twilio auth tokens. Most of them were not committed on purpose. They were committed because:

1An .env.example file had real values copy-pasted into it "temporarily"
2A developer initialized a new repo and the .gitignore was not applied retroactively
3A CI/CD pipeline printed environment variables in a failed build log
4Secrets were shared over Slack to onboard a new hire
5A .env file was sent via email to a contractor
6The production .env drifted from staging silently for months

EnvShield gives you a second pair of eyes — one that never forgets a pattern, never gets tired, and operates entirely inside your browser so your secrets stay yours.

Three Steps

From .env file to full audit in 10 seconds.

01

Drop your .env file

Drag your .env file into the browser. No install. No account. No API key for the API key checker (we see the irony). The file is read by your browser's File API and never transmitted anywhere.

02

We scan for 50+ secret patterns

EnvShield runs your file through 50+ detection patterns covering AWS, GCP, Azure, Stripe, Twilio, SendGrid, GitHub tokens, database connection strings, private keys, JWT secrets, and more. Shannon entropy analysis catches high-entropy strings that do not match any named pattern.

03

Get your audit report and .env.example

Your report shows a risk score from 0-100, a prioritized list of findings with severity ratings and remediation steps, and a generated .env.example with all real values safely replaced by format-aware descriptors.

Privacy by Design

“Your secrets never leave your browser” is not marketing copy. It is an architectural guarantee.

Most security tools process your data on their servers. They have to — that is where their code runs. We took a different approach. EnvShield's scanner is pure JavaScript that runs inside your browser tab. Your .env file is read by the browser's File API, processed in memory, and the results are rendered locally.

You can verify this yourself right now:

  1. 1.Open Chrome DevTools (F12)
  2. 2.Go to the Network tab
  3. 3.Drop your .env file into EnvShield
  4. 4.Watch the network requests

You will see zero outbound requests during the scan. Not one.

WebCrypto API

Team vault features use the browser's native WebCrypto API (AES-256-GCM) for encryption. Not a third-party library. Not our servers. Your browser's own cryptography primitives.

Open Source Scanner

The pattern detection engine is open source and published on GitHub. Security researchers, developers, and anyone curious can read every line of code that runs on your files.

View Source on GitHub

Zero-Knowledge Team Features

Even our paid team features never expose plaintext secrets to our servers. Templates are encrypted client-side before any data leaves your browser. We store only ciphertext.

What You Get

Everything you need to stop a secret leak before it happens.

Free Features

50+ Secret Pattern Library

AWS Access Keys, GCP service account keys, Azure credentials, Stripe live and test keys, Twilio auth tokens, SendGrid API keys, GitHub personal access tokens (all formats), database connection strings, JWT secrets, RSA and EC private keys, PGP blocks, SSH private keys, generic high-entropy strings.

Risk Score 0-100

Every scan produces a composite risk score based on finding severity, count, and contextual modifiers. A single Critical finding floors the score at 66 (High Risk) minimum. The score is designed to be conservative.

Auto-Generated .env.example

Format-aware replacements. A detected Stripe key becomes sk_live_your_stripe_secret_key. A database URL becomes postgresql://username:password@host:5432/database_name. Comments preserved. One-click download.

Scan Coverage Report

After every scan, see exactly which pattern categories were checked. Know what was looked for, not just what was found. New patterns added over time are automatically covered on your next scan.

Remediation Guidance

Every finding includes a plain-English explanation of the risk, a link to rotate the specific credential type, and a recommendation for where to store it going forward.

Verifiable Privacy

We built the tool so you can prove to yourself it is safe. Open DevTools. Watch the network tab. The proof is there before you decide to trust us.

Pro Features

$12/mo

Env Drift Detection

Upload your production and staging .env files side by side. See which variables exist in one environment but not the other. No values leave your browser — only key names are analyzed.

Validation Schemas

Define a schema for your project: which variables are required, what type each one should be (string, number, boolean, URL, email, UUID), and what format is expected.

GitHub Integration

Connect EnvShield to your repositories. Every PR that introduces a new secret pattern gets a failing check. Findings never include actual secret values — only pattern matches and line references.

Team Features

$29/workspace/mo

Encrypted Template Sharing

Upload an approved .env template for your team. All values are stripped client-side. Key names and structure are encrypted with AES-256-GCM before upload. No more "what value goes here?" Slack messages.

Version History

Every template upload creates a new version. View who uploaded which version and when. Roll back to any previous version. Up to 10 versions retained per template.

Audit Logs

Every template access, download, and modification is logged with a timestamp and user ID. Exportable as CSV. Designed for teams working toward SOC 2 compliance.

Built for Teams

Stop sending .env files over Slack.

We have all done it. A new engineer joins. They need the staging database URL. You paste it into Slack. It lives there forever in message history, in the new hire's downloaded chat logs, in whatever Slack security incident they have next year.

EnvShield's team vault changes the workflow:

  1. 1Your team lead uploads a .env template with approved key names and descriptions
  2. 2Every engineer downloads the template and knows exactly what they need to fill in
  3. 3Real secrets are shared through proper channels (password manager, secure notes)
  4. 4No more chasing the team lead for "what does INTERNAL_API_SECRET do?"
  5. 5When someone leaves, you rotate credentials, update the template, and every team member gets the updated structure
Simple Pricing

Free for solo developers. Affordable for teams.

The core audit tool is free forever. No trial period. No credit card required. Unlimited scans. The paid plan adds team collaboration and automation features.

Free

$0/ month

For individual developers

  • Unlimited .env file scans
  • 50+ secret pattern detection
  • Risk score 0-100
  • Auto-generated .env.example
  • Scan coverage report
  • Remediation guidance per finding
  • Download and copy results
  • No account required
Scan Your First File
Most Popular

Pro

$12/ month

$99/year (save 31%)

For individual developers who want automation

  • Everything in Free, plus:
  • Env drift detection
  • Validation schema editor + runner
  • GitHub integration for PR scanning
  • Unlimited scan history
  • Priority email support
Start Pro - 14 Day Free Trial

Team

$29/ workspace / month

$249/year (save 31%)

For teams of up to 10 developers

  • Everything in Pro, plus:
  • Encrypted team template vault
  • Template version history (10 versions)
  • Role-based access control
  • Audit logs (exportable CSV)
  • Up to 10 members included
  • Slack support
Start Team Plan

All prices in USD. Annual billing saves 31% on Pro and 28% on Team. Cancel anytime. No questions asked refund within 30 days of payment.

Questions we actually get asked

Does my .env file really never leave my browser?

Yes. The scanning engine is client-side JavaScript that runs entirely in your browser tab. When you drop a file, your browser's File API reads it into memory. The pattern matching, entropy analysis, and risk scoring all happen inside your browser process. The only way to verify this is to open your browser's DevTools (F12 in Chrome), go to the Network tab, then drop your file. You will see zero outbound requests. We built it this way specifically so you can prove it to yourself.

What about the paid team features? Does anything go to your servers then?

For team features, only encrypted ciphertext is sent to our servers. When you upload a team template, all values are stripped client-side first. Then the key names and metadata are encrypted with AES-256-GCM using a team encryption key that only exists in your browser. Our servers receive and store a blob of ciphertext. We do not have the decryption key. Even if our database were breached, an attacker would get encrypted blobs with no way to decrypt them.

How does the .env.example generation work?

Each variable is processed through a set of rules. If EnvShield detects a known secret type (like a Stripe key or AWS access key), it replaces the value with a format-aware descriptor that tells future developers what format the real value should be. Boolean and numeric values are replaced with type-preserving defaults. Comments from your original file are preserved verbatim.

What if EnvShield flags something that is not actually a secret?

False positives happen. High-entropy strings and certain variable naming patterns can trigger findings on values that are not credentials. Each finding has a 'Not a secret' feedback button that you can use to dismiss it from your report.

Is the pattern library open source?

Yes. The core scanner module (envshield-scanner) is published on GitHub under the MIT license. You can read every regex pattern, every entropy calculation, and every scoring weight. Security researchers are encouraged to audit it, contribute new patterns, and report false positives or false negatives via GitHub Issues.

What .env formats does EnvShield support?

Standard .env format (KEY=value), quoted values (both single and double quotes), multi-line values (using escaped newlines), inline comments, export prefix, and full-line comments. It handles the quirks of the most common parsers including dotenv (Node.js), python-dotenv, godotenv, and phpdotenv.

Can I use EnvShield in my CI/CD pipeline?

Yes, with the Pro plan. A CLI tool (npx envshield audit) lets you run the same scan from any terminal or CI environment. It exits with code 1 if Critical findings are detected and code 0 if the scan is clean, making it simple to gate deployments.

Can I run EnvShield on an air-gapped machine?

EnvShield is a web application, so you need an initial internet connection to load the page. However, since all processing is client-side, once the page is loaded, you could technically disconnect from the internet and the scanning would still work. The open-source scanner module can also be installed via npm and run locally: npm install envshield-scanner.

The safest ten seconds you will spend today.

Drop your .env file. Find out what is actually in there. Free, forever, for individual developers.

Scan Your .env File Now

No account. No install. No data uploaded. Open in your browser right now.