@ioi
Try these, and google for more:
http://www.darknet.org.uk/2006/09/fis-file-inclusion-scanner-v01-php-vulnerability/
http://www.acunetix.com/cross-site-scripting/scanner.htm
Put in other words, searching for the leack through HTTP is much more complicated than analyze your PHP source code. I mean the hacker has propably a bot (network, remember the DOS attacks?) and let that try everything until it finds the leak. After that he has just to use it.
Join up to the VGC Mario Kart Wii GP European League!
Or the VGC Mario Kart Wii GP Australian League!
Or the VGC Mario Kart Wii GP American League!
Or the VGC Halo 3 American League!
Or the VGC Call Of Duty PS3 League!







