# Leakage of Sensitive Data to New Relic

## Overview

* **Rule ID**: `java_third_parties_new_relic`
* **Applicable Languages**: Java
* **Weakness ID**: CWE-201

## Description

Leaking sensitive data to third-party loggers like New Relic is a common cause of data breaches.

## Remediation Guidelines

* **Ensure** that all sensitive data is removed before sending it to third-party loggers like New Relic.

## References

* [**New Relic Docs**](https://docs.newrelic.com/)
* [**Log obfuscation**](https://docs.newrelic.com/docs/logs/ui-data/obfuscation-ui/)
* [**CWE-201: Insertion of Sensitive Information Into Sent Data**](https://cwe.mitre.org/data/definitions/201.html)
* [**OWASP Top 10: A01:2021 - Broken Access Control**](https://owasp.org/Top10/A01_2021-Broken_Access_Control/)

## Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our [**SAST TOOL**](https://scopy.sec1.io/login)
