Project Templates์ถ์ฒ: Show HN์กฐํ์ 8
Show HN: Privatiser โ Redact secrets, IPs, and PII before sharing with AI
By r0otie2026๋
2์ 18์ผ
**Show HN: Privatiser โ Redact secrets, IPs, and PII before sharing with AI**
I built Privatiser, to allow the pasting of configs, logs, and code into ChatGPT/Claude but without risk leaking API keys, IPs, passwords, and customer data.It detects and replaces sensitive values with consistent pseudonyms โ so the AI can still reason about your text (e.g., "these two servers share the same IP") without seeing the real data. Then you paste the AI's response back and restore everything with one click.What it catches: API keys (AWS, OpenAI, GitHub, Slack, etc.), JWTs, bearer tokens, SSH keys, connection strings, IPs, domains, emails, phone numbers, credit cards, SSNs, AWS ARNs/account IDs, Azure/GCP identifiers, UUIDs, and 200+ keyword-based patterns for passwords, hostnames, usernames, database names, etc.It also understands natural language context โ "password is secret123" and "host set to prod-db.internal" both get caught, not just key = "value" syntax.Everything runs locally in your browser. No servers, no telemetry. Available as a Chrome/Firefox (Firefox is currently pending review) extension and a web tool.Would love feedback on patterns you'd want added or things it misses. Comments URL: https://news.ycombinator.com/item?id=47054438 Points: 1 # Comments: 1
---
**[devsupporter ํด์ค]**
์ด ๊ธฐ์ฌ๋ Show HN์์ ์ ๊ณตํ๋ ์ต์ ๊ฐ๋ฐ ๋ํฅ์ ๋๋ค. ๊ด๋ จ ๋๊ตฌ๋ ๊ธฐ์ ์ ๋ํด ๋ ์์๋ณด์๋ ค๋ฉด ์๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ์ธ์.
I built Privatiser, to allow the pasting of configs, logs, and code into ChatGPT/Claude but without risk leaking API keys, IPs, passwords, and customer data.It detects and replaces sensitive values with consistent pseudonyms โ so the AI can still reason about your text (e.g., "these two servers share the same IP") without seeing the real data. Then you paste the AI's response back and restore everything with one click.What it catches: API keys (AWS, OpenAI, GitHub, Slack, etc.), JWTs, bearer tokens, SSH keys, connection strings, IPs, domains, emails, phone numbers, credit cards, SSNs, AWS ARNs/account IDs, Azure/GCP identifiers, UUIDs, and 200+ keyword-based patterns for passwords, hostnames, usernames, database names, etc.It also understands natural language context โ "password is secret123" and "host set to prod-db.internal" both get caught, not just key = "value" syntax.Everything runs locally in your browser. No servers, no telemetry. Available as a Chrome/Firefox (Firefox is currently pending review) extension and a web tool.Would love feedback on patterns you'd want added or things it misses. Comments URL: https://news.ycombinator.com/item?id=47054438 Points: 1 # Comments: 1
---
**[devsupporter ํด์ค]**
์ด ๊ธฐ์ฌ๋ Show HN์์ ์ ๊ณตํ๋ ์ต์ ๊ฐ๋ฐ ๋ํฅ์ ๋๋ค. ๊ด๋ จ ๋๊ตฌ๋ ๊ธฐ์ ์ ๋ํด ๋ ์์๋ณด์๋ ค๋ฉด ์๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ์ธ์.
