Skip to content

fix: prevent sensitive data leaking into logs#329

Open
drankou wants to merge 1 commit into
mainfrom
investigate-gh-259-sensitive-data-leaking-into-logs-eng-3973
Open

fix: prevent sensitive data leaking into logs#329
drankou wants to merge 1 commit into
mainfrom
investigate-gh-259-sensitive-data-leaking-into-logs-eng-3973

Conversation

@drankou
Copy link
Copy Markdown
Contributor

@drankou drankou commented May 14, 2026

Closes #259 . Supersedes #260 with a broader fix + tests.

Changes

  • src/app/api/auth/callback/route.ts — error branch logs hasCode: !!code instead of the raw auth code (matches the info log above).
  • src/core/shared/clients/logger/redaction.ts — add signatureSecret to redaction paths. (access_token is already covered.)
  • src/core/server/actions/{client,utils}.ts — avoid logging raw clientInput. A new summarizeClientInput helper inlines a small set of allowlisted scalar keys and replaces all other fields with shape hints like string(64), array(3), object.

@drankou drankou requested a review from ben-fornefeld as a code owner May 14, 2026 15:54
@cla-bot cla-bot Bot added the cla-signed label May 14, 2026
@linear-code
Copy link
Copy Markdown

linear-code Bot commented May 14, 2026

ENG-3973

@vercel
Copy link
Copy Markdown

vercel Bot commented May 14, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
web Ready Ready Preview, Comment May 14, 2026 3:55pm
web-juliett Ready Ready Preview, Comment May 14, 2026 3:55pm

Request Review

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Bug]: Sensitive data leaking into logs (auth code, signatureSecret, clientInput)

1 participant