You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At present all query parameters and headers are added to the trace. This introduces a security risk if some of those fields contain sensitive information e.g. authentication tokens etc.
To mitigate this, enable query fields or header fields to be excluded from the trace (or at least masked with a dummy value) by the hosting application.
I think this will be simple to achieve by adding configurable filters to akka.tracing.play.TracingSettings which can be applied in addHttpAnnotations.
(I will try and implement this week)
The text was updated successfully, but these errors were encountered:
drpacman
added a commit
to drpacman/akka-tracing
that referenced
this issue
Jul 6, 2015
At present all query parameters and headers are added to the trace. This introduces a security risk if some of those fields contain sensitive information e.g. authentication tokens etc.
To mitigate this, enable query fields or header fields to be excluded from the trace (or at least masked with a dummy value) by the hosting application.
I think this will be simple to achieve by adding configurable filters to akka.tracing.play.TracingSettings which can be applied in addHttpAnnotations.
(I will try and implement this week)
The text was updated successfully, but these errors were encountered: