Leakage of sensitive information in logger message

  • Rule ID: ruby_rails_logger
  • Languages: ruby
  • Source: logger.yml

Description

Leaking sensitive data to loggers is a common cause of data leaks and can lead to data breaches. This rule looks for instances of sensitive data sent to rails loggers.

Remediations

❌ Avoid using sensitive data in logger messages:

Rails.logger.info('User is: #{user.email}')

✅ If you need to identify a user, ensure to use their unique identifier instead of their personal identifiable information:

Rails.logger.info('User is: #{user.uuid}')

Resources

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=ruby_rails_logger

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=ruby_rails_logger