What is Argument Redaction?

2 min read Updated

Completely removing sensitive argument values from logs and audit trails. Stronger than masking — the value is never persisted in any form. Redaction ensures that even if logs are compromised, the sensitive data cannot be recovered.

WHY IT MATTERS

Some data is too sensitive for even partial logging. Medical records, encryption keys, full credentials, biometric data — these should never appear in an audit log, not even in masked form. Argument redaction removes the value entirely, replacing it with a placeholder like [REDACTED].

Redaction is the strongest privacy guarantee a proxy can offer. Where masking preserves partial information (which could potentially be reconstructed), redaction ensures zero data leakage. The log records that the argument was present and that its value was redacted, but the value itself is gone.

The trade-off is reduced debuggability. When something goes wrong with a redacted tool call, investigators cannot see what value was passed. This makes redaction appropriate for highly sensitive fields where the privacy risk outweighs the operational convenience of visible values. For moderately sensitive data, masking is usually the better choice.

HOW POLICYLAYER USES THIS

Intercept supports full argument redaction in YAML policies. Arguments tagged with redact: true have their values replaced with [REDACTED] in all audit log entries. The original value is forwarded to the MCP server for the tool call to function, but it is never written to disc or transmitted to any logging backend. Redaction is applied before any log serialisation occurs.

FREQUENTLY ASKED QUESTIONS

When should I use redaction instead of masking?
Use redaction for highly sensitive data where even partial exposure is unacceptable — encryption keys, passwords, medical records. Use masking for moderately sensitive data where partial visibility aids debugging — card numbers, account IDs.
Does redaction affect the tool call itself?
No. The original value is passed to the MCP server unchanged. Redaction only affects what appears in audit logs and monitoring systems.
Can I redact specific fields within a complex argument?
Yes. Intercept supports dot-notation paths for targeting specific nested fields for redaction, leaving the rest of the argument visible in logs.

FURTHER READING

Enforce policies on every tool call

Intercept is the open-source MCP proxy that enforces YAML policies on AI agent tool calls. No code changes needed.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.