Skip to content

Align sanitize_field_names option + central config #319

@felixbarny

Description

@felixbarny

We want to add sanitize_field_names to central config: #318

This is a setting that affects the security of the application so we want it to be aligned across agents and available in central config. This ensures that if information is leaking, it's quick and easy to update the sanitization logic across all agents.

This is the current state for our agents

Agent Applies to Matching Default
Python stacktrace locals, cookies, headers, wsgi_env, querystring, request body (depending on processors) contains? authorization, password, secret, passwd, token, api_key, access_token, sessionid
Node.js n/a n/a n/a
Ruby HTTP headers and bodies wildcard password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie (from 4.0 released before or around 7.11)
Java HTTP headers, cookies, and POST form fields wildcard password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie
Go HTTP headers, cookies, and POST form fields wildcard password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie
.NET HTTP headers, cookies, and POST form fields wildcard password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie

Status

Summary: custom ep custom ep custom ep
Agent Align sanitize_field_names option + central config
Java issue details issue details
dot-net issue details issue details
Go issue details issue details
PHP issue details issue details
Ruby issue details issue details
NodeJS issue details issue details
Python issue details issue details issue details issue details

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions