Pro‑grade file safety, built with pure JavaScript.

Drag a file, get an instant risk profile with smart heuristics and local SHA‑256 — nothing leaves your browser.

Local‑only SHA‑256 Type Mismatch Detection Heuristic Flags Dark/Light

Scan

Drop a file here or click to browse
We check extension risks, double extensions, hidden characters, size anomalies, and MIME mismatches.
Explain
Learn
History
How the score works

The score aggregates heuristic signals: suspicious extensions, double extensions, hidden characters, MIME/extension mismatches, and unusual size. It is a guide — always verify source and hashes for critical downloads.

What to do on High Risk

Do not open. Verify with the sender, re‑download from the official source, or scan with another tool. For archives, inspect contents before extracting.

Suspicious Extensions

Executable types like .exe, .bat, .cmd, .ps1, .jar can run code. Treat them carefully, especially from email or chat.

Double Extensions

Names like invoice.pdf.exe hide the true type. Enable file‑extension visibility in your OS to spot these.

SHA‑256

A cryptographic fingerprint. Some vendors list the expected hash — match it before installing software.