Socket
Socket
Sign inDemoInstall

logrocket-fuzzy-search-sanitizer

Package Overview
Dependencies
Maintainers
1
Versions
2
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

logrocket-fuzzy-search-sanitizer

Plugin for Logrocket to mask request/response bodies by designated field names


Version published
Weekly downloads
10K
decreased by-15.14%
Maintainers
1
Weekly downloads
 
Created
Source

🚀 LogRocket Fuzzy Search Sanitizer

Build Status

Optional LogRocket plugin to help sanitize data from network requests and responses.


When initializing LogRocket's SDK you can optionally provide a requestSanitizer and responseSanitizer method within the network option, which are called on each network request within your app. This is useful when you need to prevent some requests/responses or sensitive data within headers, payloads, etc. being sent to LogRocket's servers and replays.

This plugin provides pre-configured requestSanitizer/responseSanitizer methods which sanitize network payloads by the field names within each payload. This allows you to still capture every network request within in your app, getting the monitoring benefits provided by LogRocket, while allowing an easy way to mask the sensitive data in your app.

Usage

Note: You must have LogRocket installed and an app ID ready to use. See the quickstart docs.

Steps

  1. Import this plugin along with LogRocket
  2. Call the setup method on this plugin, passing an array of the private field names
    • the setup method returns a hash with the 2 sanitizer methods
  3. Init LogRocket
  4. Specify a configuration with the network option and pass in the sanitizer methods
Example
import LogRocket from 'logrocket';
import LogrocketFuzzySanitizer from 'logrocket-fuzzy-search-sanitizer';

const { requestSanitizer, responseSanitizer } = LogrocketFuzzySanitizer.setup([...privateFieldNames]);

LogRocket.init('app/id', {
  network: {
    requestSanitizer,
    responseSanitizer
  }
});
Private Field Names

This is the first argument passed to the setup method, and should be an array of strings that represent the private field names that could potentially be found in any request/response within your app.

For example, if your app obtains user sensitive data such as social security numbers, first name, date of birth, etc.:

import LogRocket from 'logrocket';
import LogrocketFuzzySanitizer from 'logrocket-fuzzy-search-sanitizer';

const privateFieldNames = [
  'ssn',
  'firstName',
  'birthDate'
];

const { requestSanitizer, responseSanitizer } = LogrocketFuzzySanitizer.setup(privateFieldNames);
LogRocket.init('app/id', {
  network: {
    requestSanitizer,
    responseSanitizer
  }
});

Now when requests and responses get passed through the sanitizer methods, any field name containing "ssn", "firstName", or "birthDate" will be masked and hidden from LogRocket.

Running / Development

  • npm install
  • Make any changes, bug fixes, etc.
  • Run tests: npm run test && npm run lint

Keywords

FAQs

Package last updated on 03 Feb 2019

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc