Explore tweets tagged as #CodeBeautify
Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys https://t.co/1Jev1l89JV
0
0
0
🚨 WARNING: Over 80,000 files with passwords and keys from governments, banks, and tech firms were found online — all pasted into public code tools like JSONFormatter and CodeBeautify. Hackers are already scraping and using the data. And yes — it’s still live. Details here →
17
196
631
🚨Cyber Alert‼️ 80,000+ Files Leaked via Code Tools Expose 5GB of Credentials from Critical Infrastructure, Government, Finance, and More Sensitive credentials and personal data have been leaking for years through online code formatting tools JSONFormatter and CodeBeautify.
1
17
45
Researchers found that code-beautifier tools like JSONFormatter & CodeBeautify exposed 80k+ public pastes containing credentials, API keys, private keys, PII & more - due to an unprotected “Recent Links” feature. Even expired links were accessed by automated scanners. Follow
0
0
0
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem) "Our research today focuses on two (out of the many) online code formatter tools: JSONformatter /CodeBeautify" https://t.co/bcvGFDJ9dW
0
0
0
लाखों पासवर्ड और सीक्रेट इंटरनेट पर 𝐋𝐄𝐀𝐊!, जानें किसकी गलती? JSONFormatter और CodeBeautify की गलती ने हजारों लॉगिन क्रेडेंशियल्स, AWS कीज और सरकारी सिस्टम कोड को पब्लिक कर दिया। जानें कैसे यह जोखिम भरा लीक पांच साल तक बिना रोक जारी रहा। #DataLeak #SecurityBreach
0
0
0
I ❤️ @CodeBeautify's HTML to Markdown https://t.co/ijSnu2E2nD Handy free tool and it still works with my add blocker so I had to share.
0
0
0
JSONFormatter と CodeBeautify の調査:大規模な機密情報の漏洩の実態が明らかに https://t.co/I2oJmHkk6F JSONFormatter や CodeBeautify などの便利なツールに、開発者がパスワードやキーまでも貼り付けてしまうことが、この種の漏洩の大きな原因となっています。ツール側の URL
0
1
0
Google Dork - Code Leaks 🔑 site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Check for code snippets, secrets, configs 👀
1
81
417
🚨 WARNING: Over 80,000 files with passwords and keys from governments, banks, and tech firms were found online — all pasted into public code tools like JSONFormatter and CodeBeautify. Hackers are already scraping and using the data. And yes, it’s still live.
0
0
0
Years of #JSONFormatter and #CodeBeautify Leaks #Expose Thousands of #Passwords and #API_Keys
https://t.co/sRCH1OI7UI
0
0
0
JSONformatterやCodeBeautifyから数千件の認証情報が露出している。watchTowr社報告。両サイトでは整形後のコードを保存し共有リンクを作成する機能があり、そこに投稿されたものをIDからスクレイピング可能。指摘を受け両サイトは保存機能を停止。
0
2
8
"How JSONFormatter and CodeBeautify Leaked Thousands of API Keys and Passwords" by Deven Chhajed #BugBounty #Cybersecurity #Hacking #InfoSec
https://t.co/E9jfYf45vU
0
0
0
🚨 ¡Atención, programadores! En la era digital, la facilidad de uso de herramientas como JSONFormatter y CodeBeautify puede ser peligrosa. 🛡️ ¡Nunca subas información sensible sin pensarlo! Protege tus datos y mantente seguro en línea. 💻 #Ciberseguridad…
0
0
0
Secrets Leaked on Code Formatting Platforms. JSONFormatter and CodeBeautify users exposed credentials, authentication keys, configuration information, private keys. GitHub found 39 million inadvertently leaked secrets across the platform last year. https://t.co/dyuxp12sFD
0
0
0
Разработчики, будьте осторожны! 🚨 Популярные сайты для форматирования кода JSONFormatter и CodeBeautify могут раскрывать пользовательские данные. Люди неосознанно загружают туда конфиденциальную информацию, которую легко могут перехватить злоумышленники 🔓
0
0
0
Google Dork - Code Leaks 🔑 site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Check for code snippets, secrets, configs 👀 Credit: @TakSec
#infosec #bugbounty #bugbountytips
0
40
264
【開発者セキュリティ】開発者がJSONFormatterやCodeBeautifyなどのオンラインフォーマットツールを通じて、パスワード、APIキー、機密データを意図せず公開している実態が明らかになった。watchTowrの調査により、重要組織から数千件の認証情報が数年間公開されていたことが判明した。
0
0
3
After years of silently poisoning trusted developer tools like JSONFormatter and CodeBeautify, attackers have finally been unmasked—exposing a long-running supply chain compromise hiding in plain sight. https://t.co/t8DNRNW644
0
0
0