Skip to content

[brainstorming] Data security/PII improvements #5526

@lobsterkatie

Description

@lobsterkatie

Starting this issue in the wake of the Slope crypto hack (where secrets were compromised by being logged to the console and therefore picked up in breadcrumbs) to think about what we might do to help prevent such a thing in the future. To be clear, in this instance Sentry was only the messenger, so to speak, transmitting and storing data that shouldn't have been out there in the first place. Nonetheless, there might be things we could do on the SDK side to make another such hack less likely.

Already done:

Other possible ideas:

  • Put a warning in the docs somewhere (maybe the breadcrumbs docs) basically saying, "Beware: If you log secret stuff to the console, it will get sent to Sentry unless you either turn off console breadcrumbs or scrub the data from the event before it's sent," with appropriate links to how to do those things.

  • While we're not going to duplicate in the SDK anything close to the full server-side scrubbing system, we could think about creating an integration which does basic keyname matching and redacts any associated values during event processing.

  • Other things I'm not thinking of? Feel free to add to this list.

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions