live · keyhound v1.4 · prowlrbot

// independent security research · responsible disclosure · prowlrbot

i found your leaked key.

here's what happens next.

you're on this page because a credential scanner I run surfaced a key tied to your infrastructure in a public source. this is the short version of what it means, what I need from you, and the 90-day timeline I follow. it's the same process every time. no pressure, no extortion.

coordinated disclosure only · ISO 29147 aligned · safe harbor

// live intel
providers
0
orgs helped
0
weaponized
0
median patch
0
section 01

why you got this email.

a credential in your name leaked publicly.

I found it before it was weaponized. this is not hypothetical — keys in public repos are scraped continuously by automated tooling run by attackers.

I am not exploiting it. I am not selling it.

I am telling you so you can rotate it. the credential exists in a public source whether I contact you or not — reporting is the ethical path.

this is called coordinated disclosure.

it's how the bug bounty economy works. I follow a 90-day standard aligned with Google Project Zero, HackerOne policy, and ISO 29147.

the 90-day timeline.

DAY 0 — first contact
  • I email you with the raw finding, redacted where appropriate
  • you reply acknowledging receipt
  • I verify you are an authorized representative of the affected org
  • no details are shared publicly at this stage

expected outcome: acknowledgment within 24h

keyhound by kdairatchi / prowlrbot
// keyhound v1.4 · go + react · private beta
/keyhound — features & access → private beta · request access

the scanner that found your leak · built by kdairatchi · private beta, request a build below

hire me for more.

one leaked key means the attack surface hasn't been mapped. if you want a real look at what else is out there, pick a tier below. I'm a solo shop — pricing reflects that.

disclosure only

$0

the default path

  • incident writeup (PDF or markdown)
  • rotation verification against the provider API
  • 90-day safe harbor
  • optional public credit

you got the email. rotate the key. done.

most common

deeper audit

$200 · $500

fixed fee, scope-based

  • full github org scan (public + accessible private)
  • historical git-blame trace on any hit
  • third-party / supply chain review
  • private writeup + remediation plan
  • two rounds of follow-up
request a quote

retainer

from $150/mo

month-to-month, cancel anytime

  • continuous monitoring of your orgs
  • private keyhound instance scoped to you soon
  • shared slack / signal channel
  • monthly findings report
  • priority response on new leaks
book a call

I also hunt on HackerOne as @anom5x. if you have a public program, ping me and I'll submit through it. want to shout out the disclosure when it ships? tag @_NOT4H4CK3R on X.

watchlist — free tier.

point me at one github org or repo. every sunday, you get an email if keyhound found anything new. $0, no card, no auto-renew. one repo per email — want more, upgrade to watch ($4/mo) or pro ($19/mo).

~/watchlist.sh — add target
$ keyhound watch --free_
free tier is manual-review. I add you within 24h, usually same-day. weekly digest starts the following sunday.

heads-up: submitting a target you don't own or run doesn't mean I'll send them anything. I'll email you the findings so you can forward, triage, or file a disclosure via this site. keyhound only reads the github code-search surface — same thing any attacker can do.

how I work.

no magic. three things make the difference — the scanner, the patterns, and your consent.

credential scanner

Custom tooling that surfaces exposed credentials across public code. Matches are validated against provider APIs before I contact anyone — no false-positive spam, no guessing.

live validation noise-filtered self-built

deep recon

Beyond the initial find — git history traces, dependency graphs, third-party exposure, and supply-chain review. Most one-key leaks have siblings hiding nearby.

git-blame aware supply-chain full-org scope

your consent

the single most important piece. nothing goes public, nothing gets chained, nothing gets shared outside our thread without your signoff. every timeline is tunable.

0 unauthorized tunable SLA nda-friendly

past disclosures.

anonymized. targets are bucketed by vertical to protect confidentiality. ttf = time-to-fix, measured from first contact to key invalidated.

date target key type status ttf tag
2026-03-18fintechaws_keypatched14h[acked]
2026-02-29saas_toolstripe_livepatched6h[bounty]
2026-02-11health_appanthropic_keypatched48h[cve]
2026-01-04media_cogithub_patpatched2h[acked]
2025-12-19devops_cigithub_tokenpatched1h[bounty]
2025-11-30edtechopenai_keypatched72h[acked]
2025-11-08crypto_exaws_secretpatched4h[cve]
2025-10-15ai_startupanthropic_keypatched18h[bounty]

who I am.

I'm kdairatchi — an independent security researcher. I hunt leaked credentials, write clean disclosure reports, and work with teams directly to close the loop.

Most of my work is tracing leaked credentials in public places (GitHub search, bug-bounty scope, that kind of thing), then writing them up so you can reproduce, fix, and close the loop. I use whatever stack fits the job; the important part is the report, not the toolchain lecture.

I don't sell exploits. I don't sit on findings. I disclose, I document, and I ship fixes with you.

kdairatchi

let's talk.

pick whichever channel fits. I read everything — responses go out within 24 hours, usually the same day.

// direct channels
proton mail fastest
prowlr@proton.me
bounty platforms
h1: @anom5x · intigriti · bugcrowd
github
github.com/kdairatchi
x / twitter shoutouts
@_NOT4H4CK3R · tag me in your hall of fame
response sla

disclosure: <24h · quote request: 1-2 days · retainer call: same week.

~/engage.sh — secure channel
$ ./contact --vendor=_
do not paste credentials here — use pgp for secrets.

tip jar (optional).

if you can't pay for an audit but want to say thanks, these go straight to me. no corporate middle layer.