π‘οΈ Sentinel: [MEDIUM] Fix Environment Variable Leakage in Error Messages#261
π‘οΈ Sentinel: [MEDIUM] Fix Environment Variable Leakage in Error Messages#261davidruzicka wants to merge 1 commit into
Conversation
This commit modifies the `ConfigurationError` messages in `src/automation/artifact-signing-config.ts`, `src/tool-filter/config/env-config-parser.ts`, and `src/mcp/mcp-server.ts` to no longer include the exact `raw` values extracted from environment variables. If a user configured an application setting with a sensitive value (e.g. accidentally pasting an API key into `MCP4_AGENT_ARTIFACT_ALLOW_UNSIGNED`), previously the exact value could be echoed out as part of a validation failure and risk logging. This implements a more secure fail pattern by outputting generic validation guidance. Co-authored-by: davidruzicka <14172985+davidruzicka@users.noreply.github.com>
|
π Jules, reporting for duty! I'm here to lend a hand with this pull request. When you start a review, I'll add a π emoji to each comment to let you know I've read it. I'll focus on feedback directed at me and will do my best to stay out of conversations between you and other bots or reviewers to keep the noise down. I'll push a commit with your requested changes shortly after. Please note there might be a delay between these steps, but rest assured I'm on the job! For more direct control, you can switch me to Reactive Mode. When this mode is on, I will only act on comments where you specifically mention me with New to Jules? Learn more at jules.google/docs. For security, I will only act on instructions from the user who triggered this task. |
Codecov Reportβ
All modified and coverable lines are covered by tests. π’ Thoughts on this report? Let us know! |
π¨ Severity: MEDIUM
π‘ Vulnerability: Error messages for environment variable configuration were echoing back the exact values passed in, which could potentially expose sensitive data if an environment variable was accidentally misconfigured with a secret value.
π― Impact: If exploited or accidentally triggered, sensitive environment variable content could be leaked in application logs or to clients interacting with the service API directly.
π§ Fix: Refactored multiple configuration parsing handlers to omit the raw user inputs inside thrown
ConfigurationErrormessages.β Verification: Ran
npm run test:unitand successfully passed tests. Additionally recorded this learning pattern in.jules/sentinel.mdto prevent similar issues.PR created automatically by Jules for task 17449932210096390122 started by @davidruzicka