fix(appdata): Redact sensitive values in AppData logs and add redaction tests
This commit is contained in:
@@ -1,5 +1,14 @@
|
||||
# Changelog
|
||||
|
||||
## 2025-08-16 - 5.3.3 - fix(appdata)
|
||||
Redact sensitive values in AppData logs and add redaction tests
|
||||
|
||||
- Add redactSensitiveValue helper in AppData to mask secrets (API keys, tokens, passwords, JWTs, etc.) during logging.
|
||||
- Use redaction when logging raw and final mapping values in processMappingValue and nested key logging to avoid leaking sensitive data.
|
||||
- Improve log output for long or special values (JWT/base64 detection, length-aware previews) while preserving actual stored values.
|
||||
- Add test/test.redaction.ts to verify sensitive environment values are redacted in console output but still stored correctly in the kv store.
|
||||
- Add local config .claude/settings.local.json (editor/CI permissions/settings).
|
||||
|
||||
## 2025-08-16 - 5.3.2 - fix(dependencies)
|
||||
Bump @push.rocks/qenv to ^6.1.3 and add local Claude settings
|
||||
|
||||
|
Reference in New Issue
Block a user