Know exactly how to validate a leaked API key or token and prove its impact.
KeyHacks is a reference for what to do after you find a secret. For dozens of services, it shows the exact request that confirms whether a leaked key is live and what it can access — turning a maybe-leak into a demonstrable finding.
Reporting a raw key is weak; reporting that it authenticates and reads data is a valid, high-impact bug. KeyHacks gets you there.
Use the minimal, read-only validation steps shown and stay within scope. Never use a leaked key to modify data or rack up charges — verifying access is enough to report.