You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While debugging an analyzer that uses an api key/secret pair for auth, I noticed that the logs aren't properly being scrubbed for secrets.
There's checks in cortexutils/worker.py for scrubbing the keys but not the secrets, which I don't think is by design since the key is the identifier for these creds with most typical vendor integrations.
At the very least, the secrets are fields that should be scrubbed in the logs, leaving the key available to trace back for debugging if necessary
Don't have access to push a PR but the fix would be L150-L153
if 'apisecret' in analyzer_input.get('config', {}):
analyzer_input['config']['apisecret'] = 'REMOVED'
if 'api_secret' in analyzer_input.get('config', {}):
analyzer_input['config']['api_secret'] = 'REMOVED'
While debugging an analyzer that uses an api key/secret pair for auth, I noticed that the logs aren't properly being scrubbed for secrets.
There's checks in cortexutils/worker.py for scrubbing the keys but not the secrets, which I don't think is by design since the key is the identifier for these creds with most typical vendor integrations.
At the very least, the secrets are fields that should be scrubbed in the logs, leaving the key available to trace back for debugging if necessary
The text was updated successfully, but these errors were encountered: