保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Error & Logging Best Practices

Sensitive data in console.log, stack traces exposed to users, React error boundaries, security logging, and PII in logs.

5 vulnerabilities

Console.log of Sensitive Data

medium

Logging passwords, tokens, full user objects, or payment data to the console sends that data to your log aggregator in plaintext.

CWE-532A09:2021

Stack Traces Exposed to User

medium

Returning stack traces or internal error details in API responses reveals your file structure, library versions, and code paths to attackers.

CWE-209A05:2021

No React Error Boundary

low

Without error boundaries, a JavaScript error in any component crashes the entire React tree and shows a blank screen to the user.

CWE-392

Insufficient Security Logging

low

Not logging security events (failed logins, permission denials, suspicious actions) means you can't detect attacks in progress or reconstruct what happened after a breach.

CWE-778A09:2021

PII in Logs

medium

Logging personally identifiable information (email, full name, IP address, phone number) creates privacy and compliance risks under GDPR and CCPA.

CWE-532A09:2021
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.