Some automated security scanners may flag ReaderWrangler as suspicious. Here's why these are false positives:
We use React and Tailwind CSS from CDN (unpkg.com, cdn.tailwindcss.com). These libraries are minified for performance, which looks like "obfuscation" to scanners. Our own code is fully readable.
Bookmarklets use javascript: URLs, which look like XSS attacks to automated tools. This is standard bookmarklet technology used by many legitimate tools (Pocket, Pinterest, etc.).
readerwrangler.com was registered in November 2025. New domains are flagged by some services simply for being new. This is a legitimate project under active development.
The bookmarklet is a small piece of JavaScript that runs on Amazon.com pages. Here's exactly what it does:
The relay server only ever sees encrypted data. Your encryption keys are generated on your device and never sent to the server.
All source code is available for inspection:
For a comprehensive technical security review, see our Security Model documentation.
Don't want to use our hosted version? ReaderWrangler is open source under the MIT License with Commons Clause. Download the source from GitHub (Code → Download ZIP), unzip, and open readerwrangler.html in your browser. No installation required.
The app runs entirely from your machine. The only external dependency is the relay for syncing data between the bookmarklet and the app — self-hosted users still use our Cloudflare relay for this, or can deploy their own using the source in the relay/ directory.
Questions or security concerns? Contact us: