How the Ed Veel link-checker actually works

Detailed process.

The Edveel Link Checker operates by first allowing a user to input a website URL into a form on the frontend, where JavaScript captures the input and sends an AJAX request via the Fetch API to the FastAPI Python backend, which is running on Uvicorn (ASGI server) on a remote Ubuntu Server in the USA. This request is routed through a reverse proxy, forwarding API calls from edveel.com to the internal FastAPI service.

FastAPI first validates the URL, ensuring it starts with http:// or https://, before invoking Selenium WebDriver, which launches a headless browser, configured to ensure stability in a cloud environment. Selenium navigates to the requested URL, allowing all JavaScript, images, and stylesheets to load fully by waiting a few seconds, then captures a page screenshot and saves it as a temporary file before converting it into Base64 format using Python’s base64 module. The file is deleted to prevent storage issues, and the Base64-encoded image is sent back to the frontend JavaScript, where it is dynamically assigned to an `img` tag, making the web page screenshot instantly visible to the user.

This ensures seamless integration between the client-side interface, proxy, FastAPI backend, Selenium-driven browser automation, and cloud infrastructure to provide a fast and secure method for viewing malicious websites in a remote sandboxed environment.

Try it now