
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
sidekiq-field-encryptor
Advanced tools
This is a utility which is intended to be used for encrypting sensitive data in Sidekiq jobs. The data is encrypted before sending it to Redis, and decrypted right before the Sidekiq job is executed.
Add the following line to your application's Gemfile.
gem 'sidekiq-field-encryptor'
And then run bundle install
.
This middleware configures encryption of any fields that can contain sensitive information. Keys in the hash are Sidekiq job classes and values are hashes that map indices in the args array to either "true" (encrypt the entire arg) or a list of keys (encrypt certain values in a hash argument). For example, the configuration hash:
{ 'Job::Foo' => { 0 => true, 3 => [ 'secret', 'id' ] } }
When applied to the Sidekiq job:
{
'class' => 'Job::Foo',
'args' => [{'x' => 1}, 'y', 'z', { 'public' => 'a', 'secret' => 'b' }],
...
}
Will encrypt the values {'x' => 1} and 'b' when storing the job in Redis and decrypt the values inside the client before the job is executed.
bundle exec rspec
) and meets Aptible's Ruby style guide (bundle exec rubocop
).MIT License, see LICENSE for details.
Copyright (c) 2024 Aptible, Blake Pettersson, and contributors.
FAQs
Unknown package
We found that sidekiq-field-encryptor demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.