Sensitive data in a logger message detected.

  • Rule ID: go_lang_logger
  • Languages: go
  • Source: logger.yml

Description

Leaking sensitive data to loggers is a common cause of data leaks and can lead to data breaches. This rule looks for instances of sensitive data sent to loggers.

Remediations

❌ Avoid using sensitive data in logger messages:

logger.info(f"User is: '{user.email}'")

✅ If you need to identify a user, ensure to use their unique identifier instead of their personal identifiable information:

logger.info(f"User is: '{user.uuid}'")

Resources

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=go_lang_logger

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=go_lang_logger

Ready to take the next step? Learn more about Bearer Cloud.