Table of Contents
How do I inspect metadata in an image I’ve pasted?
here’s the clean, practical way to inspect metadata in an image you’ve pasted — especially when you want to confirm that a Snipping Tool capture is really metadata‑free.
Below are the reliable methods, based on what’s actually possible in Windows 11 and what the tools from the search results support.
🔍 1. Use a clipboard‑inspection tool (best method)
These tools let you see exactly what formats and data Windows stored when you copied the snip.
InsideClipboard (NirSoft)
Shows every clipboard format currently stored — including bitmap, PNG, DIB, HTML, etc.
You can inspect the raw binary content too.
Clipboard Inspector (modern UI)
A newer, Windows‑11‑style clipboard viewer that shows:
- all formats
- previews
- raw data
- HTML content
[[https://github.com/nerocui/Clipboard-Inspector|GitHub]]
These tools reveal whether the clipboard contains only pixel data (typical for Snipping Tool) or whether any extra metadata formats were added by the receiving app.
🖼️ 2. Paste the image into Paint and inspect the saved file
Paint strips metadata, so this is also a verification method:
- Paste the snip into Paint.
- Save as PNG.
- Right‑click → Properties → Details.
If the Details tab is empty (it usually is), the image contains no EXIF or hidden metadata.
This method checks the file, not the clipboard — but it’s a reliable sanity check.
🧪 3. Use a metadata viewer on the saved image
If you want to double‑check:
- ExifTool (open‑source)
- Exiv2 (open‑source)
- Online EXIF viewers (safe if the image is not sensitive)
These tools confirm whether the image contains:
- EXIF
- ICC profiles
- timestamps
- GPS
- camera data
Snipping Tool images normally contain none of these.
🧩 4. Inspect clipboard formats directly (advanced)
If you want to see the raw clipboard formats without pasting:
- Tools like InsideClipboard show the list of formats (CF_BITMAP, PNG, DIB, etc.).
- This is useful if you want to confirm that the clipboard contains only pixel formats and nothing like:
- HTML
- RTF
- OLE objects
- proprietary containers
This is the most precise way to confirm privacy.
[[https://www.w3tutorials.net/blog/show-contents-of-the-windows-clipboard/|How To Show Contents of The Windows Clipboard]]
🌿 What you’ll usually find with Snipping Tool
When you copy a snip, the clipboard typically contains:
- DIB (Device Independent Bitmap)
- PNG
- Bitmap
- Optional thumbnail
And no EXIF, no GPS, no timestamps, no author info.
If you paste into a program that adds metadata (Word, OneNote, Outlook), the document may contain metadata — but the image itself does not.
✔️ Summary
To inspect metadata from a pasted Snipping Tool image:
Best method:
Use a clipboard inspector (InsideClipboard or Clipboard Inspector) to see exactly what formats and data were stored.
[[https://www.nirsoft.net/utils/inside_clipboard.html|NirSoft]]
Second method:
Paste into Paint → save → check Properties → Details.
Both will confirm that Snipping Tool images are essentially pure pixel data.
If you want, I can walk you through:
how to interpret the clipboard formats you’ll see
how to check whether a specific app added metadata
how to build a “privacy‑safe paste” workflow for your writing tools
