Skip to main content

Custom Secrets Masking Patterns

· 2 min read
Erik Osterman
Founder @ Cloud Posse

Provably safe secrets masking with custom patterns, comprehensive output coverage, and configurable replacement strings.

Why This Matters

Safe secrets management requires provably complete masking - if even one output channel bypasses the masking layer, secrets can leak. This release establishes the foundation for comprehensive secrets management by:

  1. Ensuring all output channels route through masking - terraform output, shell commands, logs, auth commands, help text, and error messages
  2. Enabling custom patterns - extend built-in patterns with organization-specific formats
  3. Providing configurable replacement - customize masked output for compliance requirements

What Changed

Comprehensive Output Coverage

All CLI output now routes through the masking layer:

  • Terraform/Helmfile command output (stdout/stderr)
  • Shell command execution
  • Logger output
  • Auth command displays
  • Documentation rendering
  • Error messages and help text

Custom Pattern Configuration

Define patterns in atmos.yaml to mask organization-specific secrets:

settings:
terminal:
mask:
enabled: true
replacement: "[REDACTED]"
patterns:
- 'demo-key-[A-Za-z0-9]{16}'
- 'internal-[a-f0-9]{32}'
- 'tkn_(live|test)_[a-zA-Z0-9]{24}'
literals:
- "super-secret-demo-value"
- "my-api-key-12345"

Built-in Protection

Atmos includes 120+ patterns from the Gitleaks library covering:

  • AWS keys and session tokens
  • GitHub/GitLab tokens
  • API keys and passwords
  • JWT tokens and private keys

Try It Out

See the secrets-masking example for a complete demo.

Get Involved