Leakage of Sensitive Data to Sentry
Overview
Rule ID:
java_third_parties_sentry
Applicable Languages: Java
Weakness ID: CWE-201
Description
Leaking sensitive data to third-party loggers like Sentry is a common cause of data breaches.
Remediation Guidelines
Ensure that all sensitive data is removed before sending it to third-party like Sentry.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
PreviousLeakage of Sensitive Data to RollBarNextLeakage of Sensitive Information in Exception Messages
Last updated