Authorization header is masked
Public verification
Redaction Test Lab
Run public redaction test cases in your browser to verify output + report behavior.
Never paste real secrets. Test Lab uses FAKE example strings only.
Cases visible: 40 / 40 · Run: 0 · Pass: 0 · Fail: 0
NOT RUN
cURL -H Authorization value is masked
cURL basic auth keeps user and masks password
Inline bearer token is masked
JWT token is replaced
x-api-key header is masked
api-key header is masked
cURL --header api key is masked
JSON api_key value is masked
api_key query param is masked
Cookie header is masked
Set-Cookie header is masked
cURL -H Cookie value is masked
AWS access key id is masked
AWS secret env assignment is masked
aws_secret_access_key key in JSON-ish text is masked
Stripe key is masked
Stripe restricted key is masked
Stripe signature header is masked
GitHub ghp token is masked
GitHub PAT token is masked
Slack xoxb token is masked
Slack xapp token is masked
SendGrid key is masked
Twilio account SID is masked
Twilio auth token key/value is masked
GitHub token regex avoids inner-word false positives
Private key block is replaced
Postgres connection URL masks password
MySQL connection URL masks password
client_secret in JSON is masked
password in JSON is masked
webhook_secret in JSON is masked
token and signature query params are masked
access_token and id_token query params are masked
session/auth query params are masked
Email is masked
IPv4 is masked
Card-like number (Luhn valid) is masked
Output contains at least one redaction placeholder