tftsr-devops_investigation/src-tauri
Shaun Arman abab5c3153 fix(security): enforce PII redaction before AI log transmission
analyze_logs() was reading the original log file from disk and sending its
full contents to external AI providers, completely bypassing the redaction
pipeline. The redacted flag in log_files and the .redacted file on disk were
written by apply_redactions() but never consulted on the read path.

Fix: query the redacted column alongside file_path. If the file has not been
redacted, return an error to the caller before any AI provider call is made.
When redacted, read from {path}.redacted instead of the original.

Adds redacted_path_for() helper and two unit tests covering the rejection
and happy-path cases.
2026-04-05 10:08:16 -05:00
..
.cargo fix: resolve clippy format-args failures and OpenSSL vendoring issue 2026-04-04 15:05:13 -05:00
capabilities fix(security): harden secret handling and audit integrity 2026-04-04 23:37:05 -05:00
gen/schemas fix(security): harden secret handling and audit integrity 2026-04-04 23:37:05 -05:00
icons fix: replace empty icon placeholder files with real app icons 2026-03-15 20:31:52 -05:00
src fix(security): enforce PII redaction before AI log transmission 2026-04-05 10:08:16 -05:00
target security: rotate exposed token, redact from PLAN.md, add secret patterns to .gitignore 2026-03-15 14:04:49 -05:00
build.rs feat: initial implementation of TFTSR IT Triage & RCA application 2026-03-14 22:36:25 -05:00
Cargo.lock fix(security): harden secret handling and audit integrity 2026-04-04 23:37:05 -05:00
Cargo.toml fix(security): harden secret handling and audit integrity 2026-04-04 23:37:05 -05:00
tauri.conf.json feat: add custom_rest provider mode and rebrand application name 2026-04-04 15:35:58 -05:00