Replies: 1 comment 1 reply
-
@jamescrosswell, did you come across this when building out the support? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I've noticed recently some examples of HTTP client instrumentation seemingly including bearer tokens in the instrumentation envelope being sent to Sentry - is this expected behaviour? Typically I'd have expected sensitive information such as authorization headers to be stripped before being sent to Sentry.
Worth noting that we're using Sentry.OpenTelemetry, which may have some bearing on this. I'm not 100% clear on which bits of the transaction information come from Sentry vs OpenTelemetry, so if this is better aimed at the OTel repo let me know :)
An example captured from the Debug option in Sentry (with the actual token masked out manually);
Appreciate some of the versions are a bit old (and updating them might turn out to be the solution) but we're having a battle getting our on-premise Sentry instance updated to a newer version (office politics, not technical) and are stuck on the pre 4.x versions of Sentry in the meantime.
How can I make sure that the Sentry client is masking out the bearer tokens in these transactions before sending them to the Sentry server? Obviously not great from a security perspective to be capturing those in the envelopes :)
Beta Was this translation helpful? Give feedback.
All reactions