Skip to content

fix(trace): handle all header flag formats and missing secret headers in redaction#1009

Merged
chaliy merged 2 commits intomainfrom
fix/issue-1002-trace-redaction
Apr 2, 2026
Merged

fix(trace): handle all header flag formats and missing secret headers in redaction#1009
chaliy merged 2 commits intomainfrom
fix/issue-1002-trace-redaction

Conversation

@chaliy
Copy link
Copy Markdown
Contributor

@chaliy chaliy commented Apr 2, 2026

Summary

  • Handle --user/-u flags (redact next argument)
  • Handle --header=value concatenated form
  • Handle -Hvalue concatenated form
  • Add missing secret headers: cookie, proxy-authorization, set-cookie, x-csrf-token

What & Why

redact_argv only handled -H/--header as standalone flags. Credentials passed via --user admin:pass, -HAuthorization: Bearer token, or --header=Authorization: Bearer token were not redacted, leaking to trace output.

Tests Added

  • test_redact_user_flag / test_redact_short_user_flag
  • test_redact_header_equals_form
  • test_redact_concatenated_h_flag
  • test_redact_cookie_header
  • test_redact_proxy_authorization

Closes #1002

chaliy added 2 commits April 2, 2026 09:56
…ders in redaction

Closes #1002 — redact_argv now handles --user/-u flags, --header=value
and -Hvalue concatenated forms, and adds cookie, proxy-authorization,
set-cookie, x-csrf-token to the secret headers list.
@chaliy chaliy merged commit 48dddc2 into main Apr 2, 2026
27 checks passed
@chaliy chaliy deleted the fix/issue-1002-trace-redaction branch April 2, 2026 10:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Trace redaction bypass via non-standard header flag formats and missing sensitive headers

1 participant