-
Notifications
You must be signed in to change notification settings - Fork 119
Closed
Description
We want to add sanitize_field_names
to central config: #318
This is a setting that affects the security of the application so we want it to be aligned across agents and available in central config. This ensures that if information is leaking, it's quick and easy to update the sanitization logic across all agents.
This is the current state for our agents
Agent | Applies to | Matching | Default |
---|---|---|---|
Python | stacktrace locals, cookies, headers, wsgi_env, querystring, request body (depending on processors ) |
contains? | authorization, password, secret, passwd, token, api_key, access_token, sessionid |
Node.js | n/a | n/a | n/a |
Ruby | HTTP headers and bodies | wildcard | password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie (from 4.0 released before or around 7.11) |
Java | HTTP headers, cookies, and POST form fields | wildcard | password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
Go | HTTP headers, cookies, and POST form fields | wildcard | password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
.NET | HTTP headers, cookies, and POST form fields | wildcard | password, passwd, pwd, secret, *key, *token*, *session*, *credit*, *card*, authorization, set-cookie |
Status
Summary: |
---|
Agent | Align sanitize_field_names option + central config |
---|---|
Java | |
dot-net | |
Go | |
PHP | |
Ruby | |
NodeJS | |
Python |