
WatchTowr scraped more than 80,000 user submissions across the two services — spanning five years of JSONFormatter usage and one year of CodeBeautify logs — yielding over 5 gigabytes of raw data. A significant portion of this data contained high-value secrets such as Active Directory credentials, AWS cloud-access keys, database and FTP passwords, SSH private keys, CI/CD configuration scripts and even complete customer Know-Your-Customer datasets including personal identifiers.
Among the most alarming disclosures was a set of live AWS credentials tied to a major international stock exchange’s Splunk instance, suggesting that even organisations tasked with monitoring security are among those inadvertently exposed. Other leaks included encrypted Jenkins master-key files, Docker and Grafana credentials for a “data-lake-as-a-service” provider, SSH session logs, database connection strings and payment-gateway API keys. Sensitive data from sectors like banking, insurance, aerospace, telecoms and education also featured prominently.
Investigators found that extracting the content was trivial because the shareable URLs followed predictable, enumeratable patterns. By automating requests to the exposed endpoints, the team collected raw JSON payloads en masse without exploiting any vulnerability beyond legitimate platform features. To verify the threat, WatchTowr deliberately uploaded dummy AWS keys marked as “canary tokens” and observed that some were probed by unknown external actors within 48 hours — a clear indication that threat actors are actively scanning these services for exploitable secrets.
The root of the problem appears to be a widespread lack of awareness among developers and administrators who treated these code-formatting platforms as quick, throwaway utilities, not understanding that the “Save” function created semi-permanent public archives. The ease and convenience offered by these tools seem to have overshadowed potential security risks, and organisations across regulated sectors are now grappling with possible exposure of production credentials and sensitive customer data.
Both JSONFormatter and CodeBeautify responded by temporarily disabling the “Save” or shareable-link feature shortly after the disclosures were publicised. The companies stated they are working to improve security and prevent misuse, though the complete extent of remediation — such as purging historic saved files or alerting affected organisations — remains unclear.
Topics
Technology