SiteShadow
Back to vulnerability library

L01 Logging Exposure

What this means

SiteShadow flagged log statements that may include secrets, credentials, tokens, or sensitive user data.

Why it matters

Logs are widely accessible; leaked secrets can enable account compromise.

Safer examples

1) Redact secrets before logging

function redact(s) {
  if (!s) return "";
  return s.slice(0, 4) + "…";
}
logger.info("Login attempt user=%s tokenPrefix=%s", userId, redact(token));

2) Don't log full request bodies by default

Especially for auth endpoints, webhooks, and payment flows.

3) Restrict access and retention

Limit who can read logs; set retention based on need; protect log sinks as sensitive systems.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage