Redact values#1971
Conversation
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
WalkthroughThe server commands now redact sensitive fields before output and persistence. The Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Note
Low Risk
Low risk: output formatting now runs through a redaction pass to avoid leaking tokens; changes are confined to CLI serialization paths and add a targeted test for Authorization header masking.
Overview
CLI
server probeandserver doctornow redact sensitive fields (e.g., auth headers/tokens) before printing results or writing JSON artifacts, including when RPC logs are attached.Adds a regression test ensuring
server doctorJSON payloads mask probeAuthorizationheaders while preserving non-sensitive headers.Reviewed by Cursor Bugbot for commit 79a93f4. Bugbot is set up for automated code reviews on this repo. Configure here.