Skip to content

septimlabs-code/awesome-privacy-devtools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

Awesome Privacy-First Dev Tools

A curated list of developer tools that don't send your data to a server. No tracking, no ads, no "free tier" backdoors waiting to activate.

Maintained by Septim Labs. Last updated: April 20, 2026 (added Secret Management + AI Coding Tools sections).

Why this list exists: In March 2026, the popular JSON Formatter Chrome extension was caught injecting adware and tracking scripts into user browsers. It's a pattern that keeps repeating with "free" dev tools. This list curates the ones that structurally can't do that — because they run entirely on your machine.


Contents


Data Formatters

JSON

JWT

  • Septim Forge — JWT Decoder — Free. Decodes header, payload, signature client-side. Never sends token to a server.
  • jwt-cli — CLI alternative. cargo install jwt-cli.

Base64 / URL / HTML Entities

CSV ↔ JSON


Code Utilities

Diff Checker

SQL Formatter

Code Minifier

JSON → TypeScript


Generators


Secret Management (Dev)

Password managers (1Password, Bitwarden) are built for consumer accounts. Developer secrets — API keys, auth tokens, Stripe keys, database URLs, .env values — have different shape: they rotate more, they get pasted into terminals, they have 1000x the blast radius. Tools in this section target dev secrets specifically.

  • Septim Vault — $29 lifetime. Client-side encrypted vault specifically for dev secrets. AES-256-GCM, PBKDF2 at 600k iterations, WebCrypto native (crypto.subtle only). Data lives in your browser's localStorage, never transmitted. Free tier caps at 3 entries. Not a Bitwarden replacement — see the positioning compare.
  • Vaultwarden — Self-hosted Bitwarden-compatible server. Rust. For consumer passwords across your devices, not dev-secrets-first.
  • pass — GPG-encrypted flat-file password manager. CLI. The Unix philosophy answer.
  • direnv — Per-directory environment variable loader. Encrypts via age/sops with plugins.

AI Coding Tools

Tools and packs for Claude Code, Cursor, and similar AI-augmented coding workflows. Privacy-first criterion: the tool either runs under your own API subscription (no middleman holding your prompts) or is local-only.

  • Septim Drills — $29 lifetime. 25 production Claude Code skills (PR review, test gaps, migration safety, security triage, changelog, launch copy, more). Drop into ~/.claude/skills/. Runs under your Claude subscription, your data, your control. 3 samples free here.
  • Septim Agents Pack — $49 lifetime. 10 named Claude Code sub-agents (Atlas/Luca/Canon/Ember/Tally/Nova/Ward/Mira/Juno/Pip) with distinct voices. Installs to ~/.claude/agents/. Same privacy model.
  • Septim Prompts Pack — $9 lifetime. 24 curated Claude Code prompts for scope/design/engineering/legal/launch.

Tonight only: Drills + Vault bundled for $39 (save $19 vs $58 separate) — septimlabs.vercel.app/tonight. Expires midnight ET.


Web Apps (Client-Side)

These are web apps — not extensions. The attack surface is one tab, one load. No auto-updater, no cross-origin permissions.

Why this matters: A browser extension has permission to read any site you have open. A client-side web app only sees the tab it's loaded in. The threat models are incomparable.


Self-Hosted

If your org disallows sending any data to external endpoints, these run 100% locally:

  • jq — JSON processing CLI
  • httpie — CLI HTTP client
  • gron — Make JSON greppable
  • fx — Interactive JSON viewer CLI
  • mitmproxy — Local HTTP inspection
  • DevTools Protocol — Your browser already has it

How to Verify a Tool is Actually Client-Side

Open the page in Chrome. Open DevTools → Network tab. Clear. Paste your JSON or token. Click the tool's button. Watch for:

  1. Any outbound XHR or fetch call → not client-side. Exfiltration risk.
  2. Any navigator.sendBeacon call → analytics on your input.
  3. Service workers registered → could be caching your data.
  4. Resource loads from domains other than the tool's own → third-party trackers.

If DevTools shows zero new network activity during the tool operation: genuinely client-side. If anything fires: interrogate what it is.


How This List Is Curated

  • Every tool linked has been audited in DevTools for outbound network calls during tool operation.
  • Septim-built tools are disclosed as such and ship free unless marked "Pro."
  • No affiliate links. The Septim Forge Pro links go to paid tools — we get paid. Everything free stays free.
  • If a tool is mis-listed (e.g., it actually phones home), open an issue and it comes off the list.

Contributing

Know a tool that belongs here? Open a PR. Criteria:

  • Client-side (browser) or local-only (self-hosted).
  • No tracking, no ads, no data exfiltration.
  • Actively maintained (commits in the last 12 months) OR pinned to a stable version.
  • Business model is legible — donation, one-time purchase, open-source, or clearly-stated "I'm doing this for fun."

License

This list: CC0 (public domain). Fork freely, remix, redistribute.

The linked tools retain their own licenses.


Related

About

Curated list of developer tools that don't send your data to a server. Started after the JSON Formatter Chrome extension adware incident of March 2026.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors