Skip to content

Conversation

@GHOryy5
Copy link

@GHOryy5 GHOryy5 commented Dec 15, 2025

Summary
This PR addresses a High-Severity Information Disclosure vulnerability (CWE-532) in the backend startup logic.

The Vulnerability
Previously, the application logged the entire config object at the debug level during startup:

debug!(target: LOG_TARGET, "{:#?}", config);

- Removed unsafe logging of the entire Config struct
- Mitigates CWE-532 (Insertion of Sensitive Information into Log File)
- Ensures database credentials and API keys are not written to stdout
- Removed unsafe logging of the entire Config struct
- Mitigates CWE-532 (Insertion of Sensitive Information into Log File)
- Ensures database credentials and API keys are not written to stdout
@CLAassistant
Copy link

CLAassistant commented Dec 15, 2025

CLA assistant check
All committers have signed the CLA.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants