| ▲ | giladd 4 hours ago | ||||||||||||||||
This is pretty cool, nice project. Can you expand on what threat model this combats? Also, does the replace op happen only for specific fields in HTTP, or for every matching string in the request? I can imagine the latter if you want to support non-standard authentications methods, though there's always the edge case where the secret string placeholder is not used as a secret and should not be replaced. | |||||||||||||||||
| ▲ | neo2006 4 hours ago | parent | next [-] | ||||||||||||||||
The main threat model is application leaking secrets: - Internet facing app that could potentially be hacked and bad actor exfiltrating secrets - AI agent that can exfiltrate secrets through prompt injection for example or context poisoning - The general use case where a secret can be for example inject by mistake in logs for instance | |||||||||||||||||
| |||||||||||||||||
| ▲ | boistrous 4 hours ago | parent | prev [-] | ||||||||||||||||
we currently support rewrites for specific hosts and IPs and we have an open issue for supporting rewrite for specific headers for http/http2 | |||||||||||||||||