DevToys Web Pro iconDevToys Web ProBlog
Bewerten Sie uns:
Browser-Erweiterung ausprobieren:
← Back to Blog

Why Your Developer Tools Should Never See Your Data

9 min read

Think about what you've pasted into an online developer tool in the last week. A JWT token to inspect the claims. A JSON payload from an API that contained user data. A password to test its strength. A private key or connection string to format it. A SQL query against your production schema.

Now ask: where did that data go?

For many popular online developer tools, the answer is "to a server you don't control." Your input is sent as an HTTP request, processed remotely, and the result is returned. It may also be logged, cached, or stored — intentionally or not.

The Data You Paste Into Dev Tools Is Often Sensitive

Developers don't think of themselves as pasting sensitive data. They think of it as "just formatting some JSON" or "just decoding a JWT." But the data itself frequently is sensitive:

  • JWT tokens — contain user identity, roles, session state, and are often valid for hours or days. A stolen JWT is a stolen session.
  • API keys and secrets — pasted into formatters or validators as part of JSON config or curl commands. Exposed once, they grant ongoing access.
  • Database credentials and connection strings — routinely appear in SQL queries, JSON configs, and environment files that get formatted or diffed online.
  • Passwords — tested in password strength checkers. If the checker sends the password to a server, you've just transmitted your password in plaintext.
  • Private keys and certificates — pasted into decoders or formatters. PEM files, RSA keys, and TLS certificates are complete credentials.
  • Personal and customer data — JSON payloads from APIs often contain names, emails, addresses, and other PII that is subject to data protection regulations (GDPR, CCPA, HIPAA).

What "Client-Side Processing" Actually Means

When we say all processing happens client-side, it means the transformation — formatting, decoding, hashing, validating — runs entirely in your browser using JavaScript or WebAssembly. Your input never leaves your machine.

Here's what happens under the hood when you format JSON in DevToys:

  1. You type or paste JSON into the input field
  2. A JavaScript function (JSON.parse + JSON.stringify) runs in your browser tab
  3. The formatted output is written to the DOM — also in your browser
  4. No network request is made for the tool operation

Compare that to a server-side tool, where step 2 is replaced by an HTTP POST to a remote server, and you receive back an HTTP response with the result. The operator of that server has access to everything you sent.

How to Verify It Yourself

You don't have to take our word for it. You can verify client-side processing in about 30 seconds using your browser's DevTools:

  1. Open JWT Decoder (or any tool)
  2. Open DevTools: F12 on Windows/Linux, Cmd+Option+I on macOS
  3. Go to the Network tab
  4. Filter by Fetch/XHR to show only API requests
  5. Paste a JWT token and watch the network tab

You'll see zero outbound requests for your tool input. The only network activity is loading the page assets (JS, CSS) — which happened before you typed anything.

Network requests while using DevToys JWT Decoder:
──────────────────────────────────────────────
GET  /encoders-decoders/jwt          200  (page load)
GET  /_next/static/chunks/...        200  (JS bundle)
GET  /_next/static/chunks/...        200  (JS bundle)
──────────────────────────────────────────────
[You paste your JWT token here]
──────────────────────────────────────────────
(no further requests)

Your token never left your browser.

The Browser as a Sandboxed Compute Environment

Modern browsers are remarkably capable execution environments. The tools that run in DevToys use the same APIs and libraries that server-side tools use — just running locally:

ToolTechnology usedRuns where
JSON FormatterJSON.parse / JSON.stringifyBrowser JS engine
JWT DecoderBase64url decode + JSON parseBrowser JS engine
Base64 Encoder/Decoderatob / btoa / TextEncoderBrowser JS engine
Password Strengthzxcvbn libraryBrowser JS engine
Hash GeneratorWeb Crypto APIBrowser crypto (hardware-accelerated)
Image CompressorWebAssembly (libvips / squoosh)Browser WASM runtime
SQL Formattersql-formatter libraryBrowser JS engine
Regex TesterNative JS RegExpBrowser JS engine

WebAssembly in particular has made it possible to run computationally intensive operations (image processing, compression, cryptography) at near-native speed entirely in the browser — operations that previously required a server.

Compliance and Regulatory Implications

For developers working in regulated industries, the destination of your data matters beyond personal preference:

  • GDPR (EU) — Sending customer personal data to an unvetted third-party tool may constitute unauthorized data processing. A formatter that receives a JSON payload with names and emails is a data processor under GDPR.
  • HIPAA (US healthcare) — Protected health information (PHI) cannot be transmitted to services without a Business Associate Agreement. Many online dev tools have no BAA and are not HIPAA-compliant.
  • SOC 2 / ISO 27001 — Sending production data to external services may violate information security policies that engineers are required to follow.
  • Internal security policies — Many enterprise security teams explicitly prohibit pasting credentials or customer data into online tools. Client-side tools are generally considered compliant since data doesn't leave the machine.

When all processing happens in your browser, none of these concerns apply — there is no third-party data processor, because the "server" is your own browser tab.

Offline and Air-Gapped Use

Client-side processing has a practical benefit beyond privacy: it works without an internet connection. Once the page assets are loaded (or cached as a PWA), DevToys tools continue working offline. This matters for:

  • Development on a plane or without reliable connectivity
  • Air-gapped environments (classified networks, secure development workstations)
  • CI environments without outbound internet access
  • High-security on-premise development setups

DevToys is available as a Progressive Web App (PWA) — you can install it from the browser and use it fully offline. Your tools, your data, no network required.

How to Choose a Privacy-Respecting Dev Tool

Before pasting sensitive data into any online tool, apply this checklist:

  1. Check the network tab — Use DevTools to confirm no outbound request is made when you use the tool. If an XHR/fetch fires, your data is being sent somewhere.
  2. Read the privacy policy — Does it mention logging, analytics, or data retention? Many tools log inputs for "improving the service."
  3. Check if the tool works offline — A tool that works after you disconnect from Wi-Fi cannot be sending your data to a server.
  4. Look at the source code — Open-source tools let you verify what the code actually does. No source? No way to verify.
  5. Use the browser extension or desktop app instead — The DevToys browser extension works entirely locally, with even stronger guarantees about data isolation.

Tools Where Privacy Matters Most

Some categories of dev tools handle data that is almost always sensitive. Be especially careful about server-side processing for:

  • JWT Decoder — Active session tokens; a stolen JWT = a stolen login session
  • Password Strength Checker — You are literally sending your password to someone else's server
  • Base64 Decoder — Often used to decode tokens, credentials, and embedded secrets
  • Hash Generator — Hashing passwords or API keys? The input is the sensitive part.
  • RSA Key Generator — Private keys generated on a server are known to that server
  • JSON Formatter — API responses, config files, and payloads often contain PII and credentials
  • SQL Formatter — Queries reveal schema structure and often contain real data values

Summary

The convenience of online developer tools comes with a hidden cost: your data travels to infrastructure you don't control, operated by people you've never vetted, under terms you probably didn't read.

Client-side processing eliminates that risk entirely. When the tool runs in your browser, your data never leaves your machine — no transmission, no logging, no third-party data processor.

Every tool in DevToys processes your data locally. You can verify it in DevTools in 30 seconds. And if you want the strongest possible guarantee, install the browser extension — your tools, your machine, zero servers involved.


Want to verify DevToys never sends your data? Open any tool, launch DevTools (F12), go to the Network tab, filter by Fetch/XHR, and use the tool — you'll see zero outbound requests for your input.