{"id":36832685,"url":"https://github.com/ehrktia/sensitive","last_synced_at":"2026-01-12T14:16:07.620Z","repository":{"id":230622219,"uuid":"779822385","full_name":"ehrktia/sensitive","owner":"ehrktia","description":"library to mask sensitive fields","archived":false,"fork":false,"pushed_at":"2024-03-31T19:09:07.000Z","size":26,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-06-20T23:09:27.359Z","etag":null,"topics":["data-security","golang-library","personal-identifiable-information"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ehrktia.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-03-30T21:52:52.000Z","updated_at":"2024-03-31T08:58:13.000Z","dependencies_parsed_at":"2024-03-30T22:32:09.190Z","dependency_job_id":"287bc729-ff8d-4b99-a157-2c5519207b9e","html_url":"https://github.com/ehrktia/sensitive","commit_stats":null,"previous_names":["ehrktia/sensitive"],"tags_count":2,"template":false,"template_full_name":null,"purl":"pkg:github/ehrktia/sensitive","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ehrktia%2Fsensitive","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ehrktia%2Fsensitive/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ehrktia%2Fsensitive/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ehrktia%2Fsensitive/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ehrktia","download_url":"https://codeload.github.com/ehrktia/sensitive/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ehrktia%2Fsensitive/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28340387,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-12T12:22:26.515Z","status":"ssl_error","status_checked_at":"2026-01-12T12:22:10.856Z","response_time":98,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["data-security","golang-library","personal-identifiable-information"],"created_at":"2026-01-12T14:16:05.903Z","updated_at":"2026-01-12T14:16:07.612Z","avatar_url":"https://github.com/ehrktia.png","language":"Go","readme":"# sensitive\n\n\n\u003cp align=\"center\"\u003e\n\u003cimg src=\"./assets/read_image.jpeg\" title=\"\" alt=\"logo!\" data-align=\"center\"\u003e\n\u003c/p\u003e\n\n\n\n[![Go Reference](https://pkg.go.dev/badge/github.com/ehrktia/sensitive@v0.1.0.svg)](https://pkg.go.dev/github.com/ehrktia/sensitive@v0.1.0)\n\n\nThis is a lib which can be used to hide sensitive values in struct.Mostly in microservices/applications config is managed via external (json/yaml) files. The values are parsed and mapped to struct. Some applications which speaks to external APIs will require key to be provided. These keys can be managed in config value fields.When logging the config values in public these secrets can be exposed and cause data leaks.\n\nFocus of the lib is to manage data leaks,the lib has a `Mask` method which is\n\nused to perform this operation.\n\nThere are 2 input fields required for the operation\n\n1. data structure\n\n2. list of fields which are required to be masked or hidden\n\n### usage\n\nrefer to `example/main.go`  for how to use\n\n*Note:-* please set env variable `SET_VALUE` with required value to be\nused for masking sensitive value  \n\n### Todo\n\n- [ ] expand the functionality to non exported columns\n\n### contributing\n\nplease feel free to raise a PR with your changes\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fehrktia%2Fsensitive","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fehrktia%2Fsensitive","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fehrktia%2Fsensitive/lists"}