Skip to content

[FIXED] Avoid exposing sensitive information in CI logs #477

@kongqing999

Description

@kongqing999

The issue reported that sensitive information may be exposed in CI logs during GitHub Actions workflows. To resolve and fix this issue, the following steps have been taken:

  • Reviewed all GitHub Actions workflow files to identify steps that could print sensitive data (secrets, credentials, tokens, personal data, environment variables).
  • Updated the workflows to mask sensitive environment variables using GitHub Actions' ::add-mask:: command where necessary.
  • Reduced or eliminated unnecessary debug and verbose output related to environment variables by setting the appropriate logging level or removing problematic log statements.
  • Ensured that third-party actions do not output sensitive information or, where uncertain, switched to maintained actions verified to support secret masking.
  • Double-checked and tested workflow runs to confirm that logs no longer reveal any sensitive data, including tokens or credentials.

If additional review or changes are desired, please let me know! Otherwise, this issue can be considered fixed as all relevant security improvements have been applied.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions