Data Redaction is an Enterprise plan feature. Contact [email protected] to enable it.
Quick Reference
| Item | Description |
|---|---|
| Detected Patterns | API keys, tokens, passwords, connection strings, private keys |
| Redaction Process | Detection, scrubbing, backup, and display |
| Scope | Traces, console output, errors, network logs, attachments |
| Exclusions | Test titles, file paths, git metadata, timing data |
How Redaction Works
1. Detection
When artifacts (traces, logs, console output) are uploaded, the system scans content for patterns matching sensitive information.Detected Patterns
| Pattern Type | Examples |
|---|---|
| API keys | sk_live_*, sk_test_*, api_key_*, AKIA* (AWS) |
| Authentication tokens | Bearer tokens, JWT tokens, OAuth access/refresh tokens |
| Passwords | Password fields in configuration, connection strings |
| Environment variables | DATABASE_URL, SECRET_KEY, PRIVATE_KEY, custom secrets |
| Connection strings | Database URIs containing credentials |
| Private keys | RSA/EC private key blocks, PEM-encoded certificates |
| Cloud credentials | AWS secret keys, GCP service account keys, Azure connection strings |
2. Scrubbing
Identified secrets are replaced with*********. No sensitive values persist in readable form.
before-redaction.json
after-redaction.json
3. Secure Backup
TestDino retains an encrypted backup of the original unredacted files for authorized audit and incident investigation.- Encrypted at rest using AES-256
- Access restricted to designated security administrators
- Both versions follow the organization’s configured data retention policy
- Backup access is logged for audit trail
4. Display
When viewing or downloading artifacts in the dashboard:- Detected secrets appear as
********* - Redaction applies across all artifact types: traces, logs, console output
- Original artifact structure and formatting is preserved. Only secret values are replaced.
What Gets Redacted
| Artifact Type | Redaction Scope |
|---|---|
| Playwright traces | Environment variables, inline secrets, auth tokens in network request/response headers |
| Console output | Logged secrets, connection strings, token values |
| Test step errors | Secrets in error messages or stack traces |
| Network logs | Authorization headers, cookie values, API keys in URLs |
| Inline attachments | Secrets in base64-decoded attachment content |
What Does NOT Get Redacted
- Test titles and descriptions (user-authored content)
- File paths and line numbers
- Non-secret environment metadata (OS, Node.js version, browser settings)
- Git metadata (commit hashes, branch names, author names)
- Test statistics and timing data
Infrastructure-Level Log Redaction
TestDino uses structured logging with built-in sensitive data redaction at the infrastructure level. This runs independently of the artifact redaction feature and is active on all plans.- Passwords, tokens, and API keys are stripped from application logs
- Audit logs record user ID, action, resource, and IP address
Related
Review what data is collected and how long it is retained.Access to Customer Data
Full list of data TestDino collects
Data Retention
Retention periods by tier and data category