Why Use It
Built for teams that do not want to send raw payloads to AI tools
This tool was created for cases where customer or system data needs to be reviewed,
shared, or pasted into prompts, tickets, chats, and documents without exposing raw
personal information first.
- Mask sensitive fields before sharing payloads with AI systems or external tools
- Keep redaction local to the browser instead of sending raw data to a backend
- Useful for support logs, QA payloads, internal reviews, and vendor communication
How It Works
Masking logic
The tool checks common sensitive field names first, then applies pattern-based masking
for values such as email addresses and phone numbers found in plain text.
- Field-based masking for keys like `email`, `phone`, `clientSecret`, and `customerId`
- Pattern-based masking for values embedded in strings
- Pretty-print and copy/download options for clean handoff
FAQ
Common questions
Does this upload my JSON anywhere?
No. The masking runs entirely in the browser on the current page.
Can I add my own masking fields?
Yes. Add custom field names such as `customerId`, `reservationCode`, or `caseNumber` and mask again.
Who is this tool for?
This tool is for anyone who handles customer or system data and needs to review,
share, or troubleshoot JSON safely, especially across engineering, support,
operations, analytics, and compliance workflows.