
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Analyze Reddit comments for PII and other sensitive information using local or OpenAI API compatible LLMs and perform sentiment analysis, edit and remove comments.
Local LLM powered, highly performant privacy analysis leveraging AI, sentiment analysis & PII detection
to provide insights into your true privacy with bulk remediation
For aging engineers who want to protect their future political careers ๐๏ธ
๐ก๏ธ | PII Detection Analyze the content of comments to identify anything that might reveal PII that you may not want correlated with your anonymous username |
๐คซ | Sentiment Analysis Understand the emotional tone of your Reddit history, combined with upvote/downvote counts & privacy risks to choose which posts to reddact |
๐ | Zero-Trust Architecture Client-side execution only, no data leaves your machine unless you choose to use a hosted API. Fully compatible with all OpenAI compatible endpoints |
โก | Self-Host Ready Use any model via Ollama, llama.cpp, vLLM or other platform capable of exposing an OpenAI-compatible endpoint. LiteLLM works just dandy. |
๐ | Smart Cleanup Preserve valuable contributions while removing risky content - clean up your online footprint without blowing away everything |
You don't have to - read the code for yourself, only reddit is called
reddacted user yourusername --local-llm "http://localhost:11434"
reddacted user taylorwilsdon --limit 3
# Install from brew (recommended)
brew install taylorwilsdon/tap/reddacted
# Install from PyPI (recommended)
pip install reddacted
# Or install from source
git clone https://github.com/taylorwilsdon/reddacted.git
cd reddacted
pip install -e ".[dev]" # Installs with development dependencies
# Most basic possible quick start - this will walk you through selecting your LLM in the command line
reddacted user spez
# Analyze a user's recent comments with local LLM specified
reddacted user spez \
--limit 5 \
--local-llm "http://localhost:11434" \
--model "qwen2.5:3b" \
--sort new
# Analyze controversial comments with OpenAI
export OPENAI_API_KEY="your-api-key"
reddacted user spez \
--sort controversial \
--time month \
--model "gpt-4" \
--limit 10 \
--pii-only
# Analyze a specific subreddit post with PII filter disabled
reddacted listing r/privacy abc123 \
--local-llm "http://localhost:11434" \
--model "qwen2.5:3b" \
--disable-pii \
--sort new
# Search for specific content (requires auth)
reddacted user spez \
--enable-auth \
--text-match "python" \
--skip-text "deleted" \
--sort top \
--time all
# Bulk comment management
reddacted delete abc123,def456 --batch-size 5 # Delete comments
reddacted update abc123,def456 # Replace with standard redaction message
reddacted update abc123,def456 --use-random-string # Replace with random UUID
Command | Description |
---|---|
user | Analyze a user's comment history |
listing | Analyze a specific post and its comments |
delete | Delete comments by their IDs |
update | Replace comment content with r/reddacted |
Argument | Description |
---|---|
--limit N | Maximum comments to analyze (default: 100, 0 for unlimited) |
--sort | Sort method: hot, new, controversial, top (default: new) |
--time | Time filter: all, day, hour, month, week, year (default: all) |
--output-file | Save detailed analysis to a file |
--enable-auth | Enable Reddit API authentication |
--disable-pii | Skip PII detection |
--pii-only | Show only comments containing PII |
--text-match | Search for comments containing specific text |
--skip-text | Skip comments containing specific text pattern |
--batch-size | Comments per batch for delete/update (default: 10) |
--use-random-string | Use random UUID instead of standard message when updating comments |
Argument | Description |
---|---|
--local-llm URL | Local LLM endpoint (OpenAI compatible) |
--openai-key KEY | OpenAI API key |
--openai-base URL | Custom OpenAI API base URL |
--model NAME | Model to use (default: gpt-4 for OpenAI) |
--openai-key
flag or set the environment variable:
export OPENAI_API_KEY="your-api-key"
Surprisingly good. Good enough that I run it against my own stuff in delete mode. It's basically a defense-in-depth approach combining these methods:
Doesn't need a crazy smart model, don't waste your money on r1 or o1.
50+ regex rules for common PII formats does a first past sweep for the obvious stuff
Are you coming off as a dick? Perhaps that factors into your decision to clean up. Who could say, mine are all smiley faces.
Adjust confidence threshold (default 0.7) per risk tolerance. You're building a repo from source off some random dude's github - don't run this and just delete a bunch of stuff blindly, you're a smart person. Review your results, and if it is doing something crazy, please tell me.
Local: any model via Ollama, vLLM or other platform capable of exposing an openai-compatible endpoint.
Cloud: OpenAI-compatible endpoints
If you choose to use a hosted provider, yes - in cloud mode - local analysis stays fully private.
If you get "command not found" after installation:
# Typical Linux/Mac location
export PATH="$HOME/.local/bin:$PATH"
# Typical Windows location
set PATH=%APPDATA%\Python\Python311\Scripts;%PATH%
pip show reddacted
Before running any commands that require authentication, you'll need to set up your Reddit API credentials:
If you don't have one, sign up at https://www.reddit.com/account/register/
After creating the app, note down:
export REDDIT_USERNAME=your-reddit-username
export REDDIT_PASSWORD=your-reddit-password
export REDDIT_CLIENT_ID=your-client-id
export REDDIT_CLIENT_SECRET=your-client-secret
These credentials are also automatically used if all environment variables are present, even without the --enable-auth
flag.
You can filter comments using these arguments:
Argument | Description |
---|---|
--text-match "search phrase" | Only analyze comments containing specific text (requires authentication) |
--skip-text "skip phrase" | Skip comments containing specific text pattern |
For example:
# Only analyze comments containing "python"
reddacted user spez --text-match "python"
# Skip comments containing "deleted"
reddacted user spez --skip-text "deleted"
# Combine both filters
reddacted user spez --text-match "python" --skip-text "deleted"
This project uses UV for building and publishing. Here's how to set up your development environment:
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
pip install uv
pip install -e ".[dev]"
uv build --sdist --wheel
./release.sh
The release script will:
That's it! The package handles all other dependencies automatically, including NLTK data.
Run the test suite:
pytest tests
Want to contribute? Great! Feel free to:
If you're unauthenticated, reddit has relatively low rate limits for it's API. Either authenticate against your account, or just wait a sec and try again.
Simply a 404, which means that the provided username does not point to a valid page.
Pro Tip: Always review changes before executing deletions!
Join our subreddit: r/reddacted
FAQs
Analyze Reddit comments for PII and other sensitive information using local or OpenAI API compatible LLMs and perform sentiment analysis, edit and remove comments.
We found that reddacted demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago.ย It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.