Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Lære Avoiding Information Leakage | Safe Coding Practices
Python Security Best Practices

bookAvoiding Information Leakage

Understanding how to prevent information leakage is a key part of writing secure Python code. Information leakage occurs when sensitive data—such as passwords, API keys, or personal user details—are unintentionally exposed through logs, error messages, or other outputs. This type of vulnerability can have serious consequences, including unauthorized access, data breaches, and compliance violations. You need to ensure that your code does not reveal confidential information, even in development or debugging scenarios.

12345678910
import logging logging.basicConfig(level=logging.DEBUG) def authenticate(username, password): logging.debug(f"Authenticating user '{username}' with password '{password}'") # Authentication logic here return username == "admin" and password == "secret123" authenticate("qwerty", "12345")
copy

In the code above, the debug log statement includes the password variable in the log output. If this code runs in a real system, anyone with access to the logs could see users' passwords. This kind of information leakage is extremely dangerous because logs are often stored, aggregated, or sent to external services where unauthorized personnel might gain access. Attackers may search logs for sensitive data, and even accidental exposure can violate security policies or regulations.

12345678910
import logging logging.basicConfig(level=logging.DEBUG) def authenticate(username, password): logging.debug(f"Authenticating user '{username}'") # Authentication logic here return username == "admin" and password == "secret123" authenticate("qwerty", "12345")
copy

By removing the password from the log message, you avoid exposing sensitive information while still capturing useful context for debugging and auditing. This secure logging approach helps you trace authentication attempts without risking password leaks. Always review your log statements to ensure no confidential data is included, and consider using log filtering or masking for any data that might be sensitive.

Note
Definition

Information leakage in software refers to the unintended exposure of sensitive data—such as passwords, cryptographic keys, or personal identifiers—through logs, error messages, or system outputs. This can give attackers valuable clues or direct access to confidential information.

question mark

Why is logging sensitive information a security risk?

Select the correct answer

Var alt klart?

Hvordan kan vi forbedre det?

Tak for dine kommentarer!

Sektion 2. Kapitel 2

Spørg AI

expand

Spørg AI

ChatGPT

Spørg om hvad som helst eller prøv et af de foreslåede spørgsmål for at starte vores chat

Awesome!

Completion rate improved to 5.56

bookAvoiding Information Leakage

Stryg for at vise menuen

Understanding how to prevent information leakage is a key part of writing secure Python code. Information leakage occurs when sensitive data—such as passwords, API keys, or personal user details—are unintentionally exposed through logs, error messages, or other outputs. This type of vulnerability can have serious consequences, including unauthorized access, data breaches, and compliance violations. You need to ensure that your code does not reveal confidential information, even in development or debugging scenarios.

12345678910
import logging logging.basicConfig(level=logging.DEBUG) def authenticate(username, password): logging.debug(f"Authenticating user '{username}' with password '{password}'") # Authentication logic here return username == "admin" and password == "secret123" authenticate("qwerty", "12345")
copy

In the code above, the debug log statement includes the password variable in the log output. If this code runs in a real system, anyone with access to the logs could see users' passwords. This kind of information leakage is extremely dangerous because logs are often stored, aggregated, or sent to external services where unauthorized personnel might gain access. Attackers may search logs for sensitive data, and even accidental exposure can violate security policies or regulations.

12345678910
import logging logging.basicConfig(level=logging.DEBUG) def authenticate(username, password): logging.debug(f"Authenticating user '{username}'") # Authentication logic here return username == "admin" and password == "secret123" authenticate("qwerty", "12345")
copy

By removing the password from the log message, you avoid exposing sensitive information while still capturing useful context for debugging and auditing. This secure logging approach helps you trace authentication attempts without risking password leaks. Always review your log statements to ensure no confidential data is included, and consider using log filtering or masking for any data that might be sensitive.

Note
Definition

Information leakage in software refers to the unintended exposure of sensitive data—such as passwords, cryptographic keys, or personal identifiers—through logs, error messages, or system outputs. This can give attackers valuable clues or direct access to confidential information.

question mark

Why is logging sensitive information a security risk?

Select the correct answer

Var alt klart?

Hvordan kan vi forbedre det?

Tak for dine kommentarer!

Sektion 2. Kapitel 2
some-alt