Alt Text Security Scanner
Alt text fields are an overlooked attack surface. Scan any webpage to detect hidden payloads, script injection, SQL injection, base64-encoded strings, and malicious content buried in image attributes — before someone else finds it first. Free, no account needed.
Public pages only. Scans static HTML — for JS-rendered pages or login-protected pages, use the bookmarklet below for a full in-browser scan.
// Free Browser Bookmarklet
Scan any page you're currently on — including login-protected pages, staging environments, and localhost — with one click. No URL required. The bookmarklet runs entirely in your browser.
How to Install
Chrome: Ctrl+Shift+B (Windows) / Cmd+Shift+B (Mac) ·
Firefox: View → Toolbars → Bookmarks Toolbar
Click and hold the AEOfix Alt Scanner button above and drag it up to your bookmarks bar. Release to drop.
Go to the page you want to audit. Click AEOfix Alt Scanner in your bookmarks bar. A panel appears overlaid on the page — images are highlighted by status.
Click the × button in the panel or click the bookmark again to remove the overlay and outlines.
Can't drag? Install manually
Right-click your bookmarks bar → Add page → paste the code below as the URL:
// Why Alt Text Is an Attack Surface
Most people think alt text is just for screen readers. Attackers know better. Image alt attributes are rarely audited, never visible to casual visitors, and processed by crawlers, scrapers, search engines, and AI systems — making them a low-visibility channel for embedding malicious content.
This scanner detects what you can't see. It reads the raw HTML the same way a security auditor or malicious bot would — exposing anything that doesn't belong.
Script tags, event handlers, and javascript: URIs embedded in alt text can execute in vulnerable parsers, scrapers, and legacy CMS preview systems.
Base64 strings, hex-encoded data, and null-byte sequences can be used to exfiltrate data or smuggle content past content filters.
Keyword stuffing and URL injection in alt text manipulate search crawler behavior — a sign of compromised pages or malicious third-party scripts.
// Frequently Asked Questions
javascript: URIs, inline HTML elements, event handler patterns (onerror=, onmouseover=), SQL injection strings, base64-encoded payloads (40+ chars), long hex strings, multiple URLs, and HTML-encoded control characters. Any of these in an alt attribute is abnormal and warrants investigation.IMG_4532.jpg), generic placeholder labels, alt text over 150 characters, or comma-separated keyword lists (a classic SEO spam signal). These may indicate lazy CMS defaults, a compromised page, or a third-party script gone wrong.Want a Full Site Security & Visibility Audit?
Alt text is one layer. A full AEOfix audit covers AI crawler access controls, schema integrity, robots.txt exposure, content structure vulnerabilities, and how AI engines are currently reading and representing your site.
View Audit Services