Intel

AIKIDO-2026-10112

sigstat-grpc is vulnerable to Insertion of Sensitive Information into Log File

Insertion of Sensitive Information into Log File Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

24

Low Risk

This Affects:

RUSTsigstat-grpc
0.0.1 - 0.14.1
Fixed in 0.15.0

TL;DR

Affected versions of this package may expose secret API keys in log output during network errors because errors include unmasked keys. The patched version sanitizes secret keys at the source of log formatting so that any instance of a secret key is masked (e.g., replacing characters after secret-) before it is logged, preventing accidental leakage of sensitive credentials in logs.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

sigstat-grpc is vulnerable to Insertion of Sensitive Information into Log File in versions 0.0.1 - 0.14.1.

How to fix this

Upgrade the sigstat-grpc library to the patch version.

Background Info