Skip to content

Conversation

@mittal-parth
Copy link
Owner

Removes sensitive log statements and unnecessary debug logs from the frontend to enhance security and reduce console clutter.

The removed logs included potentially sensitive information such as hash values, signatures, encoded invite data, stream tokens/keys, request bodies with user addresses, full transaction receipts, and verbose contract debug information. Removing these prevents accidental exposure of private data and improves the clarity of the console for legitimate debugging.


Open in Cursor Open in Web

Remove console.log statements that could expose sensitive information:
- Cryptographic hashes and signatures in inviteUtils.ts
- Signature and hash data in HuntDetails.tsx team invite flow
- Stream tokens in HuddleRoom.tsx
- Request body with user addresses in Clue.tsx
- Full transaction receipts in transactionUtils.ts

Also cleaned up verbose debug logs that were cluttering the console:
- Network/contract debug info in Create.tsx and Hunts.tsx
- Transaction args logs
- Full error object serialization

Error logging (console.error) for debugging purposes is retained.

Closes #202
@cursor
Copy link

cursor bot commented Dec 29, 2025

Cursor Agent can help with this pull request. Just @cursor in comments and I'll start working on changes in this branch.
Learn more about Cursor Agents

@netlify
Copy link

netlify bot commented Dec 29, 2025

👷 Deploy Preview for khoj-alpha processing.

Name Link
🔨 Latest commit ed55b42
🔍 Latest deploy log https://app.netlify.com/projects/khoj-alpha/deploys/69520c4531c1bf000898ab4e

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants