Where is bidi spoofing most risky?
Code reviews, logs, and filenames are common targets because visual order can hide intent.
Bidirectional control marks can reorder visible characters and create misleading output.
Inspect pasted text for invisible or risky Unicode characters, visualize findings, and generate cleaned output entirely in your browser.
Drop .txt/.csv/.json here
or click to choose a file (max 2 MB)
| Symbol | Category | Unicode name | Code point | Occurrences | Positions | Actions |
|---|---|---|---|---|---|---|
No findings No matching characters found in the current analysis snapshot. | ||||||
Code reviews, logs, and filenames are common targets because visual order can hide intent.
Only when inappropriate for context. They are necessary for legitimate right-to-left text.