Skip to content

Security: Sanitize sensitive data in request logs to prevent PII/secrets exposure #45

@coderabbitai

Description

@coderabbitai

Description

The analyzer currently logs full request queries and post data without redacting sensitive information, which could expose PII, authentication tokens, session IDs, and other secrets in logs.

Context

This issue was identified during code review of the server-side rendering enhancement where request logging was expanded to include more detailed information.

Current Behavior

Request logs include raw and fields that may contain sensitive information such as:

  • Authentication tokens
  • API keys
  • Session IDs
  • Personal information
  • Passwords or secrets

Expected Behavior

Sensitive fields should be redacted before logging, replacing sensitive values with placeholders like <redacted> based on key patterns.

Related Links

Requested by: @synacktraa

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions