- 
          
- 
                Notifications
    You must be signed in to change notification settings 
- Fork 1.7k
Description
Starting this issue in the wake of the Slope crypto hack (where secrets were compromised by being logged to the console and therefore picked up in breadcrumbs) to think about what we might do to help prevent such a thing in the future. To be clear, in this instance Sentry was only the messenger, so to speak, transmitting and storing data that shouldn't have been out there in the first place. Nonetheless, there might be things we could do on the SDK side to make another such hack less likely.
Already done:
- Add to our default list of keys whose values get scrubbed when an event is ingested: fix(pii): Add private keys as secret key name relay#1376
Other possible ideas:
- 
Put a warning in the docs somewhere (maybe the breadcrumbs docs) basically saying, "Beware: If you log secret stuff to the console, it will get sent to Sentry unless you either turn off console breadcrumbs or scrub the data from the event before it's sent," with appropriate links to how to do those things. 
- 
While we're not going to duplicate in the SDK anything close to the full server-side scrubbing system, we could think about creating an integration which does basic keyname matching and redacts any associated values during event processing. 
- 
Other things I'm not thinking of? Feel free to add to this list.