Passive · Safe · Authorized

A passive website scanner built for real-world monitoring.

WebHound checks your website for security weaknesses, risky scripts, exposed paths, weak browser protections, cookie issues, TLS/DNS problems, and suspicious changes — without exploit attempts or destructive testing.

webhound — scanner
$webhound scan
Results in under 3 minutes
Never modifies your site
Authorized targets only
0
Engines
0+
Checks
< 3 min
Max Scan Time
100%
Passive Only
Scan Profiles

Choose the right scan for the job

From quick pre-deploy checks to fully scheduled WADE monitoring — every scan is passive and safe.

QuickSurface check

Fast sanity check before a deploy or after a change.

Depth~5 pages
Speed< 30 seconds
StandardRecommended

Full site scan for most use cases. Best balance of coverage and speed.

Depth~25 pages
Speed1–3 minutes

All engines active. Covers navigation links, forms, scripts, and assets.

DeepFull audit

Pre-launch or quarterly security review. Maximum crawl depth.

Depth~100 pages
Speed5–10 minutes
MonitorWADE mode

Scheduled recurring scans that compare against a behavioral baseline.

DepthConfigurable
SpeedBackground
Scan Engines

12 engines. Every scan.

Each engine runs in parallel, analyzing a specific slice of your site's security posture.

Security Headers

Analyzes HTTP response headers for browser-enforced security controls.

Detects: Missing HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy.

CSP Analysis

Deep inspection of Content-Security-Policy directives for unsafe patterns.

Detects: unsafe-inline, unsafe-eval, wildcard sources, missing directives, report-uri misconfig.

TLS Checker

Validates your site's certificate, cipher configuration, and HTTPS enforcement.

Detects: Expired certs, weak ciphers, missing HSTS, non-HTTPS redirect chains.

DNS Checker

Checks email authentication and DNS security records for your domain.

Detects: Missing or invalid SPF, DKIM, DMARC, DNSSEC, and dangling DNS entries.

Cookie Scanner

Audits every cookie set by your site and flags missing security attributes.

Detects: Cookies without Secure, HttpOnly, or SameSite. Session cookies accessible to JavaScript.

JavaScript Analyzer

Inspects inline scripts and loaded files for risky patterns without executing code.

Detects: eval(), document.write, obfuscation, hardcoded credentials, dangerous DOM sinks.

Third-Party Domains

Maps every external source your site contacts and categorizes what they are.

Detects: Unknown script domains, cross-domain iframes, external form actions, fetch/XHR destinations.

Sensitive Paths

Probes common paths that are frequently left publicly accessible by accident.

Detects: .env, admin panels, phpinfo(), backup files, git metadata, debug endpoints.

Secret Scanner

Scans page source and loaded scripts for credential patterns that shouldn't be public.

Detects: API keys, AWS credentials, JWT tokens, private keys, and common secret formats.

Form Risk

Audits HTML forms for security issues including insecure submission targets.

Detects: HTTP form actions, cross-domain POST targets, missing CSRF indicators.

Technology Detection

Identifies frameworks, CMS platforms, and libraries in use on the page.

Detects: Known outdated versions, exposed version strings, CMS-specific vulnerability indicators.

WADE Baseline

Compares the current scan against the established behavioral baseline.

Detects: New external domains, new scripts, DOM structure shifts, new form targets, anomaly score.

Safety Model

What we do — and what we never do

WebHound's scanner is designed to be safe on any live site at any time.

What WebHound does
  • Reads publicly accessible page content — exactly as a browser would
  • Checks response headers, certificates, and DNS records
  • Scans static HTML and loaded script files for patterns
  • Safe to run continuously against live production sites
What WebHound never does
  • Does not exploit vulnerabilities or probe for attack vectors
  • Does not brute-force credentials or login endpoints
  • Does not submit forms or execute JavaScript on your site
  • Does not run load tests, fuzzing, or destructive operations

By using WebHound you confirm you own or are authorized to scan every target you add. Unauthorized scanning is a violation of our terms and may be illegal.

How It Works

From URL to report in minutes

No configuration, no agents, no infrastructure changes.

Step 1

Add your website

Enter the URL. No DNS records, no server config, no agent installation needed.

Step 2

Choose a scan profile

Quick for fast checks, Standard for full coverage, Deep for audits, Monitor for WADE recurring scans.

Step 3

Scanner crawls safely

WebHound fetches linked pages and resources — read-only, never modifying anything it touches.

Step 4

Engines analyze the evidence

All 12 engines run in parallel against the collected artifacts — headers, scripts, forms, cookies, DNS.

Step 5

Findings are grouped

Results are organized by engine, severity, and fix priority. Every finding includes context and guidance.

Step 6

Reports and monitoring are generated

Download SARIF, CSV, or Markdown. If WADE has a baseline, anomaly scores are computed automatically.

Results

What you see after a scan

Every scan produces structured, actionable results — not a wall of raw data.

Risk Score

0

Medium Risk

Some gaps found. Worth fixing.

Findings by Severity

HIGH
1
MEDIUM
3
LOW
5

Engine Status

Security Headers
CSP Analysis
TLS Checker
JavaScript Analyzer
WADE Baseline

External Domains

cdn.jsdelivr.netCDN
analytics.google.comAnalytics
unknown-tracker.ioUnknown

Recommended Fixes

Add Content-Security-Policy header
Set Secure + HttpOnly on session cookies
Configure SPF record for your domain

Export Report

Download your full scan report in any format for your team, clients, or auditors.

SARIFGitHub / Azure DevOps
CSVSpreadsheet / tickets
MarkdownWiki / PR-ready
Free to start

Run your first passive website scan.

No credit card. No installation. Scan only sites you own or are authorized to test.

Passive scanning
No exploitation
No installation
Authorized targets only