Scan a File with JS URLs
This article guides you through using Jsmon's File Scan feature, which allows you to upload a file containing a list of JavaScript URLs for batch processing and security analysis.
Step 1: Navigate to the Scans Page
First, select your workspace.
Click on "Go to scans" to navigate to the main scans window.
Optionally, you can also click "View all scans" to access the same screen, which provides additional filter options on the left-hand side.

Step 2: Upload Your File
On the scan screen, click on the "File Scan" option. [00:00:31]
Click "Choose file" and select the file from your local machine that contains the list of JavaScript URLs you wish to scan. (The video example shows a file containing 16 URLs.)
Once the file is selected, click "Upload."
When the file name is visible in the interface, click the "Submit" button to start the scan.

Step 3: Track the Scan Status
The current status of the scan will show as "in progress" in the scans list.
Click the "Reload" button to refresh the list and view the current status.
Step 4: View the Scan Results Overview
When the status changes to "success," click on the scan entry to see its details, which are categorized into Overview, Secrets, and JS Intelligence Data.
The Overview section provides a summary, including:
The number of URLs that were successfully scanned (e.g., all 16 URLs).
A preview of API endpoints (limited to the last 25).
Any PII data detected, such as leaked emails.
The Secrets tab shows issues detected and their severity.

Step 5: Explore the Full JS Intelligence
The default JS Intelligence tab only displays four fields: API endpoints, URLs, Domains, and Domain Status. These fields are often limited to showing the last 25 entries.
To see the complete and comprehensive data—including other valuable fields like API paths, IP addresses, S3 buckets, and bucket takeovers—click the "View JS Intelligence" button.
For more information, you can watch the full video tutorial here: How to Scan a File with JavaScript URLs in Jsmon | Detect Secrets & Vulnerabilities
Last updated