DETECTS "MADE WITH AI" TRIGGERS

C2PA Content Credentials Checker

Find out if your image contains C2PA Content Credentials before you post. These hidden markers cause Instagram, Facebook, and LinkedIn to automatically label your image as AI-generated.

JPEG APP11 JUMBF boxesPNG caBX, caMs, caSt chunksCAI Content Authenticity markersC2PA data size and byte offsetLikely AI tool identificationInstant browser-side scanning

Drop image here or click to check

JPEG, PNG, WebP - scanning happens in your browser

How it works

How to use this tool

1

Drop or select your image

Drag the image into the zone or click to browse. JPEG, PNG, and WebP are supported. Nothing is uploaded anywhere.

2

See the C2PA scan result

The tool reports whether C2PA Content Credentials are present, the format type, data size, and the likely AI tool that created them.

3

Remove before posting

If C2PA is found, use StripShot to strip it at the binary level before uploading to Instagram, Facebook, or LinkedIn.

What C2PA is

C2PA (Coalition for Content Provenance and Authenticity) is an open standard that embeds cryptographically signed metadata into image files. AI tools use it to record generation details, model version, and creation date.

How it triggers AI labels

Instagram, Facebook, and LinkedIn scan uploaded images for C2PA Content Credentials. When found, they automatically add a "Made with AI" or "AI-generated" label to your post.

Where C2PA hides in files

In JPEG files, C2PA data lives in APP11 markers (0xFF 0xEB) as JUMBF boxes. In PNG files, it lives in caBX, caMs, and caSt chunks. Both are invisible to normal image viewers.

How to remove it

StripShot strips C2PA markers at the binary level without decoding or re-encoding the image. The pixel data is completely untouched. Zero quality loss.

Want the full technical breakdown? Read our C2PA removal guide

FAQ

Frequently asked questions

What is C2PA?

C2PA (Coalition for Content Provenance and Authenticity) is an open standard that embeds cryptographically signed metadata into image files. AI tools use it to record generation details, model version, and creation date. Instagram, Facebook, and LinkedIn read it to add 'Made with AI' labels.

Will this tell me if my image will get an AI label on Instagram?

Yes. If C2PA Content Credentials are found in your image, Instagram and Facebook will add an AI label when you post. This tool detects those credentials before you upload.

Where does C2PA hide in image files?

In JPEG files, C2PA data lives in APP11 markers (0xFF 0xEB) as JUMBF boxes. In PNG files, it lives in caBX, caMs, and caSt chunks. Both are invisible to normal image viewers and most metadata tools.

Does this tool upload my image?

No. All scanning happens entirely in your browser. Your file never leaves your device and is never sent to any server.

Which AI tools embed C2PA credentials?

Adobe Firefly, DALL-E 3 (via ChatGPT), Microsoft Designer, and tools using the Content Authenticity Initiative (CAI) framework. Midjourney and basic Stable Diffusion typically do not embed C2PA, but use other AI signatures instead.

How do I remove C2PA after detecting it?

Use the StripShot metadata remover. It strips C2PA JUMBF boxes at the binary level without re-encoding your image. Zero quality loss, PNG format preserved.