Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Filter sensitive information in logs #29

Open
danschultzer opened this issue Sep 24, 2019 · 0 comments
Open

Filter sensitive information in logs #29

danschultzer opened this issue Sep 24, 2019 · 0 comments

Comments

@danschultzer
Copy link
Owner

@LostKobrakai commented on slack that some sensitive information is currently logged in requests in Phoenix, like client_secret or request_path and should be filtered.

I agree, and it may also be a good idea to hash client_secret by default in the DB.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant