live · keyhound v1.4 · prowlrbot

// independent security research · responsible disclosure · prowlrbot

i found your leaked key.

here's what happens next.

you're on this page because keyhound — a scanner I wrote — surfaced a credential tied to your infrastructure in a public source. this is the short version of what it means, what I need from you, and the 90-day timeline I follow. it's the same process every time. no pressure, no extortion.

coordinated disclosure only · ISO 29147 aligned · safe harbor

// live intel
providers
0
orgs helped
0
weaponized
0
median patch
0
section 01

why you got this email.

a credential in your name leaked publicly.

I found it before it was weaponized. this is not hypothetical — keys in public repos are scraped continuously by automated tooling run by attackers.

I am not exploiting it. I am not selling it.

I am telling you so you can rotate it. the credential exists in a public source whether I contact you or not — reporting is the ethical path.

this is called coordinated disclosure.

it's how the bug bounty economy works. I follow a 90-day standard aligned with Google Project Zero, HackerOne policy, and ISO 29147.

the 90-day timeline.

DAY 0 — first contact
  • I email you with the raw finding, redacted where appropriate
  • you reply acknowledging receipt
  • I verify you are an authorized representative of the affected org
  • no details are shared publicly at this stage

expected outcome: acknowledgment within 24h

keyhound by kdairatchi / prowlrbot
// keyhound v1.4 · go + react · open source
github.com/kdairatchi/keyhound → private · coming soon

the scanner that found your leak · built in the open by kdairatchi · private tier shipping soon

hire me for more.

one leaked key means the attack surface hasn't been mapped. if you want a real look at what else is out there, pick a tier below. I'm a solo shop — pricing reflects that.

disclosure only

$0

the default path

  • incident writeup (PDF or markdown)
  • rotation verification against the provider API
  • 90-day safe harbor
  • optional public credit

you got the email. rotate the key. done.

most common

deeper audit

$750 · $2,500

fixed fee, scope-based

  • full github org scan (public + accessible private)
  • historical git-blame trace on any hit
  • third-party / supply chain review
  • private writeup + remediation plan
  • two rounds of follow-up
request a quote

retainer

from $500/mo

month-to-month, cancel anytime

  • continuous monitoring of your orgs
  • private keyhound instance scoped to you soon
  • shared slack / signal channel
  • monthly findings report
  • priority response on new leaks
book a call

I also hunt on HackerOne as @anom5x. if you have a public program, ping me and I'll submit through it.

how I work.

no magic. three things make the difference — the scanner, the patterns, and your consent.

keyhound

the go cli + react ui I built. deterministic regex matching, validated live against provider apis, false-positives filtered by entropy and commit context. open source — the code is auditable.

42 providers go + react open source

custom dork library

2,000+ github and google dork patterns. curated weekly, tuned per provider, filtered for noise. the edge over generic scanners is the patterns, not the parser.

2k+ patterns weekly updates provider-tuned

your consent

the single most important piece. nothing goes public, nothing gets chained, nothing gets shared outside our thread without your signoff. every timeline is tunable.

0 unauthorized tunable SLA nda-friendly

past disclosures.

anonymized. targets are bucketed by vertical to protect confidentiality. ttf = time-to-fix, measured from first contact to key invalidated.

date target key type status ttf tag
2026-03-18fintechaws_keypatched14h[acked]
2026-02-29saas_toolstripe_livepatched6h[bounty]
2026-02-11health_appanthropic_keypatched48h[cve]
2026-01-04media_cogithub_patpatched2h[acked]
2025-12-19devops_cigithub_tokenpatched1h[bounty]
2025-11-30edtechopenai_keypatched72h[acked]
2025-11-08crypto_exaws_secretpatched4h[cve]
2025-10-15ai_startupanthropic_keypatched18h[bounty]

who I am.

I'm kdairatchi. I run ProwlrBot — a one-person shop that builds open-source security tooling and does independent disclosure work.

I hunt leaked credentials across github, bug bounty scopes, and public data sources, then chain them into proof-of-impact reports that vendors can actually ship fixes against. I write my own tooling in go, rust, and crystal. I use caido with plugins I maintain. I keep every target in an obsidian vault.

I don't sell exploits. I don't sit on findings. I disclose, I document, and I ship fixes with you.

what I'm building right now

keyhound (the scanner that found your leak) · hwaro (a crystal SSG powering prowlrbot.com) · custom caido plugins · a 2k+ dork library I publish weekly

prowlrbot

let's talk.

pick whichever channel fits. I read everything — responses go out within 24 hours, usually the same day.

// direct channels
proton mail fastest
prowlr@proton.me
bounty platforms
h1: @anom5x · intigriti · bugcrowd
github
github.com/kdairatchi
response sla

disclosure: <24h · quote request: 1-2 days · retainer call: same week.

~/engage.sh — secure channel
$ ./contact --vendor=_
do not paste credentials here — use pgp for secrets.

tip jar (optional).

if you can't pay for an audit but want to say thanks, these go straight to me. no corporate middle layer.