| Python |
stacktrace locals, cookies, headers, wsgi_env, querystring, request body (depending on processors) |
contains? |
authorization, password, secret, passwd, token, api_key, access_token, sessionid |
| Node.js |
n/a |
n/a |
n/a |
| Ruby |
HTTP headers and bodies |
wildcard |
password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie (from 4.0 released before or around 7.11) |
| Java |
HTTP headers, cookies, and POST form fields |
wildcard |
password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
| Go |
HTTP headers, cookies, and POST form fields |
wildcard |
password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
| .NET |
HTTP headers, cookies, and POST form fields |
wildcard |
password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
We want to add
sanitize_field_namesto central config: #318This is a setting that affects the security of the application so we want it to be aligned across agents and available in central config. This ensures that if information is leaking, it's quick and easy to update the sanitization logic across all agents.
This is the current state for our agents
processors)password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie(from 4.0 released before or around 7.11)password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookiepassword, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookiepassword, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookieStatus