# Scan a File with JS URLs

This article guides you through using Jsmon's File Scan feature, which allows you to upload a file containing a list of JavaScript URLs for batch processing and security analysis.

#### Step 1: Navigate to the Scans Page

* First, select your **workspace**.
* Click on **"Go to scans"** to navigate to the main scans window.
* Optionally, you can also click **"View all scans"** to access the same screen, which provides additional filter options on the left-hand side.

<figure><img src="https://2738632974-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFcW4H0sBfGltAsgUhISS%2Fuploads%2Fc84xmXAn3rsJqgMtmnbJ%2Fhttps---files.gitbook.com-v0-b-gitbook-x-prod.appspot.com-o-spaces%252FFcW4H0sBfGltAsgUhISS%252Fuploads%252F11eYzcgs4PXxUvLvvqAw%252Fimage.png%3Falt%3Dmedia%26token%3D47b4800a-264c-4559-9fbf-b97aff3405f2.png?alt=media&#x26;token=b88c8772-d930-4f25-b660-6953e9ee09d7" alt=""><figcaption></figcaption></figure>

#### Step 2: Upload Your File

* On the scan screen, click on the **"File Scan"** option. \[00:00:31]
* Click **"Choose file"** and select the file from your local machine that contains the list of JavaScript URLs you wish to scan. (The video example shows a file containing 16 URLs.)&#x20;
* Once the file is selected, click **"Upload."**
* When the file name is visible in the interface, click the **"Submit"** button to start the scan.

<figure><img src="https://2738632974-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFcW4H0sBfGltAsgUhISS%2Fuploads%2FuPtn81xIj0Oo5MHGlmWL%2Fimage.png?alt=media&#x26;token=c9a79cbd-8efe-449e-931c-86e61b9feea5" alt=""><figcaption></figcaption></figure>

#### Step 3: Track the Scan Status

* The current status of the scan will show as **"in progress"** in the scans list.
* Click the **"Reload"** button to refresh the list and view the current status.

#### Step 4: View the Scan Results Overview

* When the status changes to **"success,"** click on the scan entry to see its details, which are categorized into **Overview**, **Secrets**, and **JS Intelligence Data**.
* The **Overview** section provides a summary, including:
  * The number of URLs that were successfully scanned (e.g., all 16 URLs).
  * A preview of API endpoints (limited to the last 25).
  * Any PII data detected, such as leaked emails.
  * The **Secrets** tab shows issues detected and their severity.

<figure><img src="https://2738632974-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FFcW4H0sBfGltAsgUhISS%2Fuploads%2FT1lPMICH963ARK5QlI75%2Fimage.png?alt=media&#x26;token=be5c442b-5a89-46e3-a99e-0a964392655b" alt=""><figcaption></figcaption></figure>

#### Step 5: Explore the Full JS Intelligence

* The default **JS Intelligence** tab only displays four fields: API endpoints, URLs, Domains, and Domain Status. These fields are often limited to showing the last 25 entries.
* To see the complete and comprehensive data—including other valuable fields like **API paths, IP addresses, S3 buckets, and bucket takeovers**—click the **"View JS Intelligence"** button.

For more information, you can watch the full video tutorial here: [How to Scan a File with JavaScript URLs in Jsmon | Detect Secrets & Vulnerabilities](https://www.google.com/search?q=https://youtu.be/nKZ9cqM_b6s)

{% embed url="<https://youtu.be/nKZ9cqM_b6s?si=PvRNUfmFKCIgP5X->" %}

<a href="https://cal.com/jsmon/30min" class="button primary" data-icon="calendar-days">Want to learn more? Schedule a meeting with Jsmon Team!</a>
