5GB of Sensitive Data Exposed by Code Formatting Sites
80,000 Code Snippets Leak Bank & Govt Data Online

Major Security Breach: How Popular Coding Tools Exposed Critical Data

In a shocking cybersecurity revelation, two widely-used code formatting websites have been exposing thousands of passwords, security keys, and confidential information from banks, government agencies, and technology companies for up to five years. The platforms JSONFormatter and CodeBeautify left over 80,000 saved code snippets totaling more than 5GB of sensitive data freely accessible to anyone through an unprotected feature called "Recent Links."

What Data Was Exposed and Who Was Affected?

According to security researchers from WatchTowr and a detailed report by Bleeping Computer, the exposed material represents a treasure trove for cybercriminals. The leaked information includes working login credentials for cloud services and databases, private encryption keys, payment gateway access codes, and massive amounts of personal customer data from critical sectors.

The breach affected organizations across multiple vital industries including banking, healthcare, government infrastructure, aerospace, and cybersecurity. Among the most alarming discoveries were active Amazon Web Services credentials from a major international stock exchange, banking passwords leaked by a cybersecurity service provider, and internal system configurations from government entities.

One government agency inadvertently exposed approximately 1,000 lines of code containing detailed information about internal systems, security settings, and network configurations that attackers could potentially use to plan sophisticated intrusions.

How the Data Leak Occurred

The security vulnerability stemmed from how these code formatting tools handled saved code. When users clicked the "save" button to share their formatted code, the platforms automatically created public links and added them to an unprotected "Recent Links" page. Because these pages followed predictable web address patterns, anyone could easily scrape them using simple automated tools without any authentication or security checks.

This design flaw meant that sensitive code snippets containing credentials, API keys, and configuration details remained publicly accessible for years, creating an ongoing security threat that went undetected until recently.

Active Threat and Limited Response

Security researchers confirmed that cybercriminals are actively monitoring these platforms for exploitable information. To test whether threat actors were hunting for secrets, researchers planted fake but realistic-looking security credentials as bait. The decoy credentials were accessed within 48 hours, proving that malicious actors are regularly scanning these sites for valuable data.

Despite WatchTowr notifying affected organizations about the security exposure, many haven't responded or taken action. The "Recent Links" features remain publicly accessible on both websites at the time of reporting, continuing to expose new sensitive data to potential attackers.

This incident highlights the critical need for developers and organizations to carefully review the security implications of using online code formatting tools and to avoid uploading any sensitive information to such platforms, even when features appear to be convenient for sharing code snippets.