mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-06 17:50:45 +00:00
security(logging): redact payment credential fields (#75230)
Summary: - The PR adds payment-credential redaction patterns and a key-aware structured field redaction helper, wires it into tool payload sanitization, and updates focused tests, logging docs, and the changelog. ClawSweeper fixups: - No separate fixup commits were needed after automerge opt-in. Validation: - ClawSweeper review passed for head5f5f1fadbb. - Required merge gates passed before the squash merge. Prepared head SHA:5f5f1fadbbReview: https://github.com/openclaw/openclaw/pull/75230#issuecomment-4355538755 Co-authored-by: stainlu <stainlu@newtype-ai.org>
This commit is contained in:
@@ -220,6 +220,10 @@ masked before the line or message is written to disk. Redaction is best-effort:
|
||||
it applies to text-bearing message content and log strings, not every
|
||||
identifier or binary payload field.
|
||||
|
||||
The built-in defaults cover common API credentials and payment-credential field
|
||||
names such as card number, CVC/CVV, shared payment token, and payment credential
|
||||
when they appear as JSON fields, URL parameters, CLI flags, or assignments.
|
||||
|
||||
`logging.redactSensitive: "off"` only disables this general log/transcript
|
||||
policy. OpenClaw still redacts safety-boundary payloads that can be shown to UI
|
||||
clients, support bundles, diagnostics observers, approval prompts, or agent
|
||||
|
||||
Reference in New Issue
Block a user