-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data scrubbing should filter sensitive headers such as Set-Cookie
#1501
Comments
the request interface of an event is for http request headers, set-cookie is a response header. generally we are filtering header names iirc |
We're trying to use the |
I suggest we put this hold until we've completed the RFC on where to put response data in the event payload. |
I would definitely not do that. Which RFC are we talking about? |
@untitaker I'm going to write an RFC that adds |
@marandaneto sounds good. there is potential for a lot of pii there so i think we should think about designing new default scrubbing rules in the same vein. |
|
Closing in favor of getsentry/rfcs#22 |
OkHttp defines its own sensitive headers.
Some of them are filtered by Relay already, but not all of them.
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cookie
Not all HTTP clients respect that
Set-Cookie
should not be accessible.Cookie
is just removed from the headers list instead of being[Filtered]
, most likely because there's a high-level propertyRequest#cookies
already.The text was updated successfully, but these errors were encountered: