HeadlinesBriefing favicon HeadlinesBriefing.com

JSON formatter security breach

DEV Community •
×

Security researchers discovered that popular online tools JSONFormatter and CodeBeautify leaked saved data for years. Over 80,000 files containing passwords, API keys, and AWS credentials were exposed through predictable URLs. Attackers actively scraped these endpoints, testing uploaded keys within 48 hours. This wasn't a bug but a fundamental architectural flaw in how these services handled user data storage.

These platforms store pasted JSON in databases with shareable URLs, creating a massive security liability. The convenience of saving work comes at the cost of exposing sensitive corporate data from governments, banks, and healthcare providers. Developers must question whether they truly need shareable links or are simply clicking buttons without considering where their data ends up.

A local-first approach eliminates these risks entirely. By using localStorage, data never leaves the browser—no server to breach, no URLs to scrape. While you lose sharing capabilities, you gain complete control over sensitive debug output and configurations. The implementation is trivial: a simple debounced write to localStorage on state changes, with no authentication or backend infrastructure required.

The tradeoff is straightforward: online formatters work for public data you need to share, while local tools protect secrets and PII. For most developers handling API responses, keeping data on-device is dramatically safer. The author's tool fknjsn.com demonstrates this approach—a single HTML file with zero tracking, proving that the best security is sometimes not collecting data at all.