← Back Home

⚠️ Simulated Database Breach

This page shows what a compromised database might look like. You can see the actual hashes and salts stored for each API key. Despite having access to this data, stolen API keys are useless because they're stored as irreversible hashes.

Note: Newly created keys may take up to a minute to appear in this table.

Loading keys...

🧪 Test an API Key

Try verifying an API key to see how authentication works. If you have a key from the database above, paste it here. Otherwise, you can create one on the dashboard page when signed in.

Attempt to verify an API key.