Skip to content

A proof of concept to deliver a solution that mitigates the risk of sensitive information leaking into application logs

License

Notifications You must be signed in to change notification settings

mariusz-schimke/SensitiveString

Repository files navigation

SensitiveString

NuGet Version NuGet Downloads

Introducing SensitiveString, your shield against inadvertent exposure of sensitive information in application logs and beyond.

This lightweight NuGet package wraps strings in a protective layer, ensuring that sensitive data remains secure and inaccessible without explicit handling.

Safeguard your users' privacy and your application's integrity effortlessly with SensitiveString.

Example

Let's try to initialize and print a simple record with personal information:

internal record PersonDto(string Name, SensitiveString PhoneNumber, SensitiveEmail Email);
using SensitiveString;

var person = new PersonDto(
    "John Doe",
    "(800) 555‑0123".AsSensitive(),
    "[email protected]".AsSensitiveEmail()
);

Console.WriteLine($"Person info: {person}");

What we get in the console is:

Person info: PersonDto { Name = John Doe, PhoneNumber = ***, Email = ***@example.com }

Now let's try to access the original information:

Console.WriteLine($"Phone number: {person.PhoneNumber.Reveal()}");
Console.WriteLine($"Email: {person.Email.Reveal()}");

And what we now get in the console is:

Phone number: (800) 555‑0123
Email: [email protected]

How it works?

The SensitiveString and SensitiveEmail types are straightforward string wrappers. Without special handling, their content remains hidden from standard stringifiers and serializers. So if you're afraid some sensitive data may leak into application logs when stringified implicitly, use one of these two types to prevent that.

SensitiveEmail differs from SensitiveString only in how it masks the original value. If you prefer having emails fully masked rather than the login part before @, use the SensitiveString instead.

Serialization/deserialization

In client-server communication we want the information in its original form present in the data being transmitted between the parties. Because, however, of how the types are designed, without explicit handling, serializers will output nothing but an empty object.

Therefore, to use the type in DTOs, you'll need to extend your serializers in use with special converters to handle these types. Converters for the System.Text.Json.JsonSerializer are available in this repository and are part of the associated NuGet package. See below how serialization behaves with and without them.

Let's use the same person object as in the example used earlier:

using System.Text.Json;
...

var serialized = JsonSerializer.Serialize(person);
Console.WriteLine($"Serialized: {serialized}");

This is what we will get as the output:

Serialized: {"Name":"John Doe","PhoneNumber":{},"Email":{}}

As you can see, the sensitive strings are just empty JSON objects {}.

Now let's add appropriate converters to serializer options:

using System.Text.Json;
using SensitiveString.Json;
...

var serializerOptions = new JsonSerializerOptions();
serializerOptions.AddSensitiveStringSupport();

var serialized = JsonSerializer.Serialize(person, serializerOptions);
Console.WriteLine($"Serialized: {serialized}");

Now the output is complete:

Serialized: {"Name":"John Doe","PhoneNumber":"(800) 555\u20110123","Email":"[email protected]"}

The same options should be used for deserialization.

REST API

To make sure your web API handles the types correctly, call this on startup:

builder.Services
   .AddControllers()
   .AddJsonOptions(
        o => o.JsonSerializerOptions.AddSensitiveStringSupport()
    );

builder.Services.ConfigureHttpJsonOptions(
    o => o.SerializerOptions.AddSensitiveStringSupport()
);

EntityFrameworkCore

To use SensitiveString and SensitiveEmail in database entities, install a dedicated NuGet package.

HotChocolate (GraphQL)

To use SensitiveString and SensitiveEmail in GraphQL inputs and responses, install a dedicated NuGet package.

Disclaimer

This is a proof of concept. If you find any issues using the package or have any thoughts on it, your comments reported as issues are more than welcome!

About

A proof of concept to deliver a solution that mitigates the risk of sensitive information leaking into application logs

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages