Skip to content

Should be possible to sanitise option values containing sensitive information before storing the result into the history #974

Open
@martijnbrinkers

Description

@martijnbrinkers

If a shell command supports a password option, the password will be stored in the history. To prevent logging the password, as a workaround I added a rule to ignore the complete line if the line contains the keyword "password":

history-ignore: "password"

It would however be nice if I can add an annotation to an option which will result in sanitizing the option value, i.e., replace the option value by '***'

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions