[nightly-security] Harden Sentry name scrubbing by r3dbars · Pull Request #486 · r3dbars/transcripted · GitHub
Skip to content

[nightly-security] Harden Sentry name scrubbing#486

Merged
r3dbars merged 1 commit intomainfrom
codex/nightly-security-sentry-name-scrub
Apr 24, 2026
Merged

[nightly-security] Harden Sentry name scrubbing#486
r3dbars merged 1 commit intomainfrom
codex/nightly-security-sentry-name-scrub

Conversation

@r3dbars
Copy link
Copy Markdown
Owner

@r3dbars r3dbars commented Apr 23, 2026

Summary

  • Drop generic name-bearing Sentry context keys before off-device reporting.
  • Extend Sentry sanitizer coverage for meeting_name and plain name fields.

Why

Transcripted treats names and meeting labels as private user context. Analytics already filters generic name keys; this brings Sentry scrubbing in line with that privacy boundary.

Validation

  • bash run-tests.sh
  • bash build-deps.sh --force
  • bash build.sh

Sweep notes

  • No open [nightly-security] draft PR existed before this branch.
  • Latest GitHub release, Info.plist, Homebrew cask, and top appcast entry all point at 1.1.18.

@r3dbars r3dbars marked this pull request as ready for review April 24, 2026 02:16
@r3dbars r3dbars merged commit 11189ee into main Apr 24, 2026
@r3dbars r3dbars deleted the codex/nightly-security-sentry-name-scrub branch April 24, 2026 02:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant