Skip to content

[Feature Request]: Add enabled-by-default option to censor sensitive secrets outputted by stacktraces and logging #96

@Derpitron

Description

@Derpitron

Description

Currently the stacktrace and loguru logging modules spit out a bunch of local variable values at crash-time. Some of these variables include runtime configurations containing sensitive user secrets such as passwords, email addresses, and account tokens.

This is a potential security risk for users if they share their runtime logs publically for bug-tracking/fixing purposes.

Describe the solution you'd like

Implement a feature that's opted in by default, to redact/suppress any sensitive log/console outputs in logging or stack traces. Especially events of the SENSITIVE_DEBUG level in Loguru.

Describe alternatives you've considered

No response

Any other context/information?

In tandem: eventually split cfg.yml config file into a public and private config file: where public has program setting such as modes and can easily be shared in crash/bug reports, while private somehow securely stores inputted user secrets (preferably in an encrypted form)

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions