Skip to content

Audit: redis-py 7.4.0 password leak does not affect Scout#848

Open
mitchh456 wants to merge 2 commits intomasterfrom
audit/redis-7.4.0-password-leak-841
Open

Audit: redis-py 7.4.0 password leak does not affect Scout#848
mitchh456 wants to merge 2 commits intomasterfrom
audit/redis-7.4.0-password-leak-841

Conversation

@mitchh456
Copy link
Copy Markdown
Contributor

Summary

  • Audited Scout's Redis instrumentation (src/scout_apm/instruments/redis.py) in response to the redis-py < 7.4.0 ConnectionPool.__repr__() password leak
  • Confirmed Scout is NOT affected: we only wrap Redis.execute_command() and Pipeline.execute() and never call or log ConnectionPool.__repr__()
  • Added a security note comment to instruments/redis.py documenting this finding for future reference

Audit details

Searched the entire codebase for:

  • ConnectionPool references — only found in urllib3 instrumentation (unrelated)
  • __repr__ references — only found in TrackedRequest (unrelated)
  • Any redis connection pool logging or password handling — none found

Test plan

  • Existing Redis integration tests continue to pass (no behavioral changes)
  • Comment-only change; no runtime impact

Closes #841

🤖 Generated with Claude Code

mitchh456 and others added 2 commits March 31, 2026 19:38
redis-py < 7.4.0 exposed passwords in ConnectionPool.__repr__().
Scout APM only wraps Redis.execute_command() and Pipeline.execute()
and never accesses ConnectionPool.__repr__(), so we are not affected.

Add a security note documenting this finding.

Closes #841

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

redis-py 7.4.0 fixes password leak in ConnectionPool repr and exposes OTel classes

1 participant