Description
The analyzer currently logs full request queries and post data without redacting sensitive information, which could expose PII, authentication tokens, session IDs, and other secrets in logs.
Context
This issue was identified during code review of the server-side rendering enhancement where request logging was expanded to include more detailed information.
Current Behavior
Request logs include raw and fields that may contain sensitive information such as:
- Authentication tokens
- API keys
- Session IDs
- Personal information
- Passwords or secrets
Expected Behavior
Sensitive fields should be redacted before logging, replacing sensitive values with placeholders like <redacted> based on key patterns.
Related Links
Requested by: @synacktraa