Skip to content

Commit 787a709

Browse files
update the data scrubbing default values (#11949)
Co-authored-by: Martin Haintz <[email protected]>
1 parent b65e408 commit 787a709

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

docs/security-legal-pii/scrubbing/server-side-scrubbing/index.mdx

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,13 @@ With it enabled, Sentry will scrub the following:
2020
- passwd
2121
- api_key
2222
- apikey
23-
- access_token
2423
- auth
2524
- credentials
2625
- mysql_pwd
27-
- stripetoken
28-
- card[number]
29-
- github_token
3026
- privatekey
3127
- private_key
28+
- token
29+
- bearer
3230
- Values that contain strings in, or whose keynames are listed in, [Project] > Settings > Security & Privacy in "Additional Sensitive Fields".
3331
- An entry in "Additional Sensitive Fields" such as `mysekret`, for example, will cause the removal of any field named `mysekret`, but also removes any field _value_ that contains `mysekret`. Sentry does this to protect against sensitive data leaking as part of structured data that has been sent as a single string to Sentry (such as a JSON object that is stringified and embedded as JSON string in another JSON structure).
3432
- As an extreme example where this behavior can become surprising, the string `"Unexpected error"` will be removed from events if the entry `exp` is in "Additional Sensitive Fields".

0 commit comments

Comments
 (0)