Key Facts
- Category
- Security & Validation
- Input Types
- textarea, file, select, text
- Output Type
- file
- Sample Coverage
- 4
- API Ready
- Yes
Overview
The CSV/JSON Data Watermarker is a security utility designed to inject visible or signature-style tracking fields into your datasets. By embedding metadata like usernames, timestamps, and custom project codes directly into CSV or JSON exports, you can easily trace shared data back to its source and deter unauthorized leaks.
When to Use
- •Sharing sensitive datasets with external partners or vendors and needing a reliable way to trace potential leaks.
- •Distributing internal reports to different departments while maintaining strict accountability for data handling.
- •Exporting database records for offline analysis where origin tracking is required for compliance and security audits.
How It Works
- •Paste your raw CSV/JSON data or upload a file directly into the tool.
- •Specify the required username and an optional custom field, such as a ticket ID or project code.
- •Choose between a visible watermark for clear attribution or an invisible signature for discreet tracking.
- •Download the processed file containing the injected metadata, secured with your optional secret salt.
Use Cases
Examples
1. Watermarking a partner data share
Data Engineer- Background
- A data engineer needs to send a subset of user data to an external marketing partner for a joint campaign.
- Problem
- Ensuring the dataset can be traced back to this specific partner if it is ever leaked online.
- How to Use
- Upload the CSV file, set the watermark mode to 'visible', and enter the partner's identifier in the username field.
- Example Config
-
Username: partner-share-001 Custom Field: sales-demo Secret Salt: elysia-watermark - Outcome
- The exported CSV includes new columns with the partner's username, a timestamp, and the custom project field for easy attribution.
2. Discreetly tracking internal JSON reports
Security Analyst- Background
- A security analyst distributes sensitive JSON configuration files to various internal engineering teams.
- Problem
- Adding traceability without disrupting the data structure or making the tracking obvious to the recipients.
- How to Use
- Paste the JSON data, select 'invisible' mode, and provide a unique secret salt and department name.
- Example Config
-
Watermark Mode: invisible Username: internal-sec-ops Secret Salt: corp-sec-2024 - Outcome
- The JSON file is updated with a compact, hashed signature field that attributes the file to the specific team without cluttering the readable data.
Try with Samples
json, csv, textRelated Hubs
FAQ
What is the difference between visible and invisible modes?
Visible mode adds readable columns or fields, such as the username and timestamp, directly to your data. Invisible mode injects compact, hashed signature fields that are less obvious but can still be traced back to the source.
What file formats are supported?
The tool supports plain text CSV and JSON formats. You can either paste the raw text into the input field or upload .csv and .json files up to 20MB.
What is the Secret Salt used for?
The secret salt is a cryptographic string used to generate a stable, unique signature for your export. It makes it significantly harder for unauthorized users to forge or tamper with the invisible watermark.
What kind of information can I put in the Custom Field?
The Custom Field is flexible and can be used to carry any contextual metadata, such as a Jira ticket ID, department name, project code, or the specific recipient's name.
Will the watermark break my JSON structure?
No, the tool safely injects the watermark as new key-value pairs within your JSON objects, ensuring the overall file remains valid and parsable.