← Back Home
⚠️ Simulated Database Breach
This page shows what a compromised database might look like. You can see the actual hashes and salts stored for each API key. Despite having access to this data, stolen API keys are useless because they're stored as irreversible hashes.
Note: Newly created keys may take up to a minute to appear in this table.
Loading keys...
🧪 Test an API Key
Try verifying an API key to see how authentication works. If you have a key from the database above, paste it here. Otherwise, you can create one on the dashboard page when signed in.