It detects and replaces sensitive values with consistent pseudonyms — so the AI can still reason about your text (e.g., "these two servers share the same IP") without seeing the real data. Then you paste the AI's response back and restore everything with one click.
What it catches: API keys (AWS, OpenAI, GitHub, Slack, etc.), JWTs, bearer tokens, SSH keys, connection strings, IPs, domains, emails, phone numbers, credit cards, SSNs, AWS ARNs/account IDs, Azure/GCP identifiers, UUIDs, and 200+ keyword-based patterns for passwords, hostnames, usernames, database names, etc.
It also understands natural language context — "password is secret123" and "host set to prod-db.internal" both get caught, not just key = "value" syntax.
Everything runs locally in your browser. No servers, no telemetry. Available as a Chrome/Firefox (Firefox is currently pending review) extension and a web tool.
Would love feedback on patterns you'd want added or things it misses.
Zekio•1h ago