Current Path: > > opt > cloudlinux > venv > lib64 > python3.11 > site-packages > clsentry > > >
Operation : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64 Software : Apache Server IP : 162.0.232.56 | Your IP: 216.73.216.111 Domains : 1034 Domain(s) Permission : [ 0755 ]
Name | Type | Size | Last Modified | Actions |
---|---|---|---|---|
__pycache__ | Directory | - | - | |
__init__.py | File | 5447 bytes | June 23 2025 12:47:48. | |
client.py | File | 5092 bytes | June 23 2025 12:47:48. | |
processors.py | File | 901 bytes | June 23 2025 12:47:48. | |
utils.py | File | 987 bytes | June 23 2025 12:47:48. |
#!/opt/cloudlinux/venv/bin/python3 -bb # coding=utf-8 # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2019 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT """Module for all sentry processors related code""" from raven.processors import SanitizePasswordsProcessor from clsentry.utils import SENSITIVE_FIELDS class UserlandSanitize(SanitizePasswordsProcessor): """ Beside from default SanitizePasswordsProcessor algorithm, also search key-values in query-like strings. Also sanitize some additional fields. """ FIELDS = frozenset(SENSITIVE_FIELDS) def sanitize(self, item, value): new_value = super().sanitize(item, value) if new_value == value and isinstance(value, str) and '=' in value: new_value = self._sanitize_keyvals(value, '&') return new_value
SILENT KILLER Tool