Skip to content

security(infra): redact sensitive data from log output (#2348)#2531

Merged
mrveiss merged 2 commits intoDev_new_guifrom
fix/issue-2348
Mar 27, 2026
Merged

security(infra): redact sensitive data from log output (#2348)#2531
mrveiss merged 2 commits intoDev_new_guifrom
fix/issue-2348

Conversation

@mrveiss
Copy link
Owner

@mrveiss mrveiss commented Mar 27, 2026

Summary

Addresses 43 CodeQL py/clear-text-logging-sensitive-data alerts across infrastructure scripts and backend modules.

Fixes applied (12 files):

  • Secret IDs truncated to first 8 chars in log output (migrate_secrets_ownership.py, validate_migration.py, secrets_manager.py)
  • Hardcoded password removed from setup_seq_analytics.py — now reads SEQ_PASSWORD env var
  • Secret content redacted in validate-security-fixes.py findings output
  • CodeQL false-positive comments added for: secret_masking.py (masking operations), metrics.py (Redis key), security_policy_manager.py (policy check), entities.py/relations.py (entity IDs), redis_client.py (config params), seq_auth_setup.py (login API)
  • f-string logging converted to %s format in migration scripts

Closes #2348

Test plan

  • Verify migration scripts still log truncated IDs correctly
  • Verify setup_seq_analytics.py reads password from SEQ_PASSWORD env var
  • Verify false-positive suppressions don't mask real issues
  • Run CodeQL scan to confirm alert reduction

@github-actions
Copy link

github-actions bot commented Mar 27, 2026

✅ SSOT Configuration Compliance: Passing

🎉 No hardcoded values detected that have SSOT config equivalents!

@mrveiss mrveiss merged commit 6f334db into Dev_new_gui Mar 27, 2026
3 of 4 checks passed
@mrveiss mrveiss deleted the fix/issue-2348 branch March 27, 2026 10:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant