SaaS News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

SaaS Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
SaaSNewsWatch Out Coders - Top Code Formatting Sites Are Apparently Exposing Huge Amounts of User Data
Watch Out Coders - Top Code Formatting Sites Are Apparently Exposing Huge Amounts of User Data
SaaS

Watch Out Coders - Top Code Formatting Sites Are Apparently Exposing Huge Amounts of User Data

•November 26, 2025
0
TechRadar
TechRadar•Nov 26, 2025

Why It Matters

The breach demonstrates how seemingly innocuous developer tools can become treasure troves for credential harvesting, raising the risk of targeted attacks on high‑value sectors. It underscores the urgent need for robust data protection controls in SaaS platforms handling code and configuration files.

Key Takeaways

  • •Recent Links feature lacks authentication, exposing data publicly
  • •Five years of JSONFormatter data harvested by researchers
  • •Sensitive credentials and PII found across multiple sectors
  • •Criminals exploited stale links to test expired AWS keys
  • •Highlights need for secure handling of user‑submitted code

Pulse Analysis

Code‑formatting utilities like JSONFormatter and CodeBeautify have become indispensable for developers, offering quick validation and beautification of JSON, XML, and other data structures. Their convenience, however, masks a critical security blind spot: many platforms store user submissions in publicly accessible URLs without authentication. When WatchTowr uncovered the "Recent Links" endpoint, it revealed that the predictable URL schema and lack of access controls turned these services into open repositories, effectively publishing years of raw data to anyone with a simple crawler.

The exposed dataset is more than a curiosity; it contains active directory passwords, cloud service keys, private SSL certificates, and even payment‑gateway tokens. Such artifacts provide threat actors with the building blocks for lateral movement, privilege escalation, and supply‑chain compromise. The fact that criminals have already attempted to reuse expired AWS keys illustrates how quickly attackers can weaponize stale links, bypassing traditional expiration mechanisms. Moreover, the inclusion of internal endpoint configurations and registry settings offers a detailed map of target environments, facilitating highly targeted intrusion campaigns against sectors ranging from government to aerospace.

For enterprises, the incident serves as a stark reminder that any third‑party tool handling sensitive code or configuration data must enforce strict access controls, encryption at rest, and regular data purging. Security teams should audit all SaaS utilities for inadvertent data leakage and consider sandboxed environments for testing. Regulators may also scrutinize such platforms under data‑privacy frameworks, pushing vendors toward compliance‑by‑design practices. As the ecosystem of developer‑focused services expands, embedding security into the product lifecycle will be essential to prevent similar exposures from becoming the new norm.

Watch out coders - top code formatting sites are apparently exposing huge amounts of user data

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...