- Cyber Syrup
- Posts
- Code Formatting Platforms Are Exposing Thousands of Sensitive Secrets, Researchers Warn
Code Formatting Platforms Are Exposing Thousands of Sensitive Secrets, Researchers Warn
New research from WatchTowr reveals that users of online code formatting tools are unintentionally leaking thousands of sensitive secrets

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
The AI Insights Every Decision Maker Needs
You control budgets, manage pipelines, and make decisions, but you still have trouble keeping up with everything going on in AI. If that sounds like you, don’t worry, you’re not alone – and The Deep View is here to help.
This free, 5-minute-long daily newsletter covers everything you need to know about AI. The biggest developments, the most pressing issues, and how companies from Google and Meta to the hottest startups are using it to reshape their businesses… it’s all broken down for you each and every morning into easy-to-digest snippets.
If you want to up your AI knowledge and stay on the forefront of the industry, you can subscribe to The Deep View right here (it’s free!).
Code Formatting Platforms Are Exposing Thousands of Sensitive Secrets, Researchers Warn

New research from WatchTowr reveals that users of online code formatting tools are unintentionally leaking thousands of sensitive secrets—including credentials, API tokens, SSH session logs, and personal data—through saved content on public “beautifier” platforms. Analysis of over 80,000 JSON files from two popular tools, JSONFormatter and CodeBeautify, uncovered widespread unauthorized exposure affecting organizations across critical sectors. Threat actors are actively harvesting these leaks, often abusing exposed secrets within days.
Context
Secrets leakage has long been a challenge in software development. GitHub alone detected 39 million unintentionally leaked secrets across its platform last year, reinforcing how frequently developers mismanage sensitive information.
While Git-based systems typically receive blame, the problem extends far beyond repositories. Any online tool used to transform, validate, or format code—without proper sanitization—can become an unintentional storage and distribution channel for sensitive data.
Many code formatting platforms allow users to generate shareable links or retain recent projects, inadvertently making sensitive content publicly viewable.
What Happened
WatchTowr examined roughly 80,000 saved JSON files scraped from JSONFormatter and CodeBeautify via their public “Recent Links” sections. These pages revealed years’ worth of user-submitted content, much of it containing:
API keys and tokens
AWS Secrets Manager exports
Database credentials
SSH session recordings
Configuration files
Sensitive API requests and responses
Personally identifiable information (PII)
Internal service credentials
One user even pasted all AWS Secrets Manager credentials directly into an online JSON formatting tool—unaware that saving their file made the content publicly accessible.
Technical Breakdown
The exposure stems from several aligned issues:
Persistent Storage: Many beautifier tools store submitted code to generate shareable URLs.
Recent Links Indexing: Tools list recently saved sessions, enabling anyone to browse historical uploads.
Lack of Sanitization: Raw user content—including secrets—is saved without removal or redaction.
Automated Scraping: Threat actors actively monitor these platforms, harvesting leaked secrets at scale.
Rapid Abuse: WatchTowr’s experiments with fake credentials showed that leaked keys were tested or abused within days.
Once exposed, secrets cannot be “un-leaked”, especially if attackers mirrored or archived the content.
Impact Analysis
The leaked material affects organizations across critical sectors:
Cybersecurity and technology
Critical infrastructure
Government
Finance and banking
Healthcare
Aerospace
Insurance
Telecom and education
Travel and transportation
The risk extends beyond direct compromise. Stolen secrets could grant:
Unauthorized access to cloud environments
Lateral movement through internal systems
Data exfiltration or account takeover
Persistent access via leaked authentication tokens
Because code beautifiers operate outside traditional security controls, many organizations remain unaware they are leaking sensitive assets.
Why It Matters
This research highlights a systemic problem: developer workflows increasingly depend on third-party online tools, yet many of these platforms are not designed with security or data privacy in mind.
A single paste of credentials into a formatting tool can:
Bypass organizational controls
Expose privileged keys publicly
Enable automated attacker harvesting
Create long-term risk even after revocation
In a landscape where attackers actively monitor exposed-data sources, even small mistakes can create outsized impact.
Expert Commentary
WatchTowr summarizes the issue bluntly:
“We don’t need more AI-driven agentic agent platforms; we need fewer critical organizations pasting credentials into random websites.”
Cybersecurity teams emphasize:
Reducing reliance on unsanctioned online tools
Enforcing strict secret-handling policies
Using offline or self-hosted formatters
Implementing automated leak detection and credential rotation
Training developers on secure workflows
The message is clear: convenience cannot outweigh security when handling sensitive data.
Key Takeaways
Online code beautifiers are leaking thousands of sensitive secrets.
WatchTowr found credentials, PII, keys, tokens, and internal logs across 80,000+ uploaded files.
Threat actors scrape these platforms and exploit exposed secrets quickly.
Leaks affect organizations across critical sectors, including cybersecurity and government.
The core issue is user saving behavior—not the platforms themselves.
Secure development requires strict handling of secrets and trusted tools only.

