Why it happens
Developers log context for debugging. Sometimes that context includes sensitive fields. A payment service logs the full request body. An auth service logs tokens for troubleshooting. An error handler dumps the entire user object. Nobody intends to leak PII. But it happens. And once it’s in your observability provider, you have a compliance problem.Example
- Credit card numbers
- Email addresses
- Before
- After
Recommended enforcement
Enforce at edge
Redact PII before data leaves your network. The data never reaches your provider.
Open PRs
Fix the instrumentation so PII is never logged in the first place.
How it works
Tero scans log content for patterns that match sensitive data using regex patterns from gitleaks, a widely-used open source project for secret detection. When Tero finds sensitive data, it identifies the field and the service. You can then redact (replace with[REDACTED]), hash (replace with a consistent hash for correlation), or drop the field entirely.
Supported patterns
Each category below can be approved as a set of policies. Approve the categories relevant to your compliance requirements.Personal information
Personal information
- Credit card numbers (Visa, Mastercard, Amex, Discover)
- Social Security numbers (US)
- National Insurance numbers (UK)
- Email addresses
- Phone numbers
- IP addresses
- IBANs
Cloud providers
Cloud providers
- AWS access keys and secret keys
- GCP API keys
- Azure AD client secrets
- Alibaba access keys
- DigitalOcean tokens
- Heroku API keys
- Cloudflare API keys
- Databricks API tokens
Source control & CI/CD
Source control & CI/CD
- GitHub tokens (PAT, OAuth, App, Fine-grained)
- GitLab tokens (PAT, Deploy, Runner, CI/CD job)
- Bitbucket client secrets
- Travis CI tokens
- CircleCI tokens
- Drone CI tokens
Communication & collaboration
Communication & collaboration
- Slack tokens (bot, user, webhook)
- Discord tokens
- Telegram bot tokens
- Microsoft Teams webhooks
- Mattermost tokens
- Twilio API keys
Databases & infrastructure
Databases & infrastructure
- Database connection strings
- Planetscale tokens
- MongoDB connection strings
- Redis connection strings
- Elasticsearch credentials
Payment & financial
Payment & financial
- Stripe API keys
- Square access tokens
- Plaid API tokens
- Coinbase access tokens
- GoCardless tokens
AI & ML services
AI & ML services
- OpenAI API keys
- Anthropic API keys
- Hugging Face tokens
- Cohere API tokens
Observability & monitoring
Observability & monitoring
- Datadog access tokens
- New Relic API keys
- Grafana API keys
- Sentry tokens
- Dynatrace API tokens
SaaS & productivity
SaaS & productivity
- Notion API tokens
- Asana client secrets
- Linear API keys
- Jira API tokens
- Shopify access tokens
- SendGrid API tokens
- Mailchimp API keys
Cryptographic material
Cryptographic material
- Private keys (RSA, DSA, EC, PGP)
- JWTs
- PKCS12 files
- Age secret keys