Data Redaction is an Enterprise plan feature. Contact [email protected] to enable it.
Quick Reference
| Item | Description |
|---|---|
| Detected Patterns | API keys, tokens, passwords, connection strings, private keys |
| Redaction Process | Detection, scrubbing, backup, and display |
| Scope | Traces, console output, errors, network logs, attachments |
| Exclusions | Test titles, file paths, git metadata, timing data |
How Redaction Works
1. Detection
When artifacts (traces, logs, console output) are uploaded, the system scans content for patterns matching sensitive information.Detected Patterns
| Pattern Type | Examples |
|---|---|
| API keys | sk_live_*, sk_test_*, api_key_*, AKIA* (AWS) |
| Authentication tokens | Bearer tokens, JWT tokens, OAuth access/refresh tokens |
| Passwords | Password fields in configuration, connection strings |
| Environment variables | DATABASE_URL, SECRET_KEY, PRIVATE_KEY, custom secrets |
| Connection strings | Database URIs containing credentials |
| Private keys | RSA/EC private key blocks, PEM-encoded certificates |
| Cloud credentials | AWS secret keys, GCP service account keys, Azure connection strings |
2. Scrubbing
Identified secrets are replaced with*********. No sensitive values persist in readable form.
before-redaction.json
after-redaction.json
3. Secure Backup
TestDino retains an encrypted backup of the original unredacted files for authorized audit and incident investigation.- Encrypted at rest using AES-256
- Access restricted to designated security administrators
- Both versions follow the organization’s configured data retention policy
- Backup access is logged for audit trail
4. Display
When viewing or downloading artifacts in the dashboard:- Detected secrets appear as
********* - Redaction applies across all artifact types: traces, logs, console output
- Original artifact structure and formatting is preserved. Only secret values are replaced.
What Gets Redacted
| Artifact Type | Redaction Scope |
|---|---|
| Playwright traces | Environment variables, inline secrets, auth tokens in network request/response headers |
| Console output | Logged secrets, connection strings, token values |
| Test step errors | Secrets in error messages or stack traces |
| Network logs | Authorization headers, cookie values, API keys in URLs |
| Inline attachments | Secrets in base64-decoded attachment content |
What Does NOT Get Redacted
- Test titles and descriptions (user-authored content)
- File paths and line numbers
- Non-secret environment metadata (OS, Node.js version, browser settings)
- Git metadata (commit hashes, branch names, author names)
- Test statistics and timing data
Infrastructure-Level Log Redaction
TestDino uses structured logging with built-in sensitive data redaction at the infrastructure level. This runs independently of the artifact redaction feature and is active on all plans.- Passwords, tokens, and API keys are stripped from application logs
- Audit logs record user ID, action, resource, and IP address