From: maximiliancw Date: Fri, 9 Jan 2026 16:03:55 +0000 (+0100) Subject: Update all references to outdated versions X-Git-Url: http://git.99rst.org/?a=commitdiff_plain;h=b8905f51534b08670ce118578c1aeb4345418b6f;p=sgasser-llm-shield.git Update all references to outdated versions --- diff --git a/README.md b/README.md index e376c5a..15e415e 100644 --- a/README.md +++ b/README.md @@ -62,7 +62,7 @@ Additional entity types can be enabled: `US_SSN`, `US_PASSPORT`, `CRYPTO`, `NRP` | Bearer tokens | `Bearer ...` (20+ char tokens) | Secrets detection runs **before** PII detection. Three actions available: -- **block** (default): Returns HTTP 422, request never reaches LLM +- **block** (default): Returns HTTP 400, request never reaches LLM - **redact**: Replaces secrets with placeholders, unredacts in response (reversible) - **route_local**: Routes to local LLM (route mode only) @@ -213,7 +213,7 @@ secrets_detection: log_detected_types: true # Log types (never logs content) ``` -- **block** (default): Returns HTTP 422 error, request never reaches LLM +- **block** (default): Returns HTTP 400 error, request never reaches LLM - **redact**: Replaces secrets with placeholders, unredacts in response (reversible, like PII masking) - **route_local**: Routes to local provider when secrets detected (requires route mode) diff --git a/config.example.yaml b/config.example.yaml index abfede7..a6a1b7d 100644 --- a/config.example.yaml +++ b/config.example.yaml @@ -96,7 +96,7 @@ secrets_detection: enabled: true # Action to take when secrets are detected: - # block: Block the request with HTTP 422 (default, secure-by-default) + # block: Block the request with HTTP 400 (default, secure-by-default) # redact: Replace secrets with placeholders, unmask in response (reversible) # route_local: Route to local provider (only works in route mode) action: block diff --git a/src/routes/proxy.ts b/src/routes/proxy.ts index f944c0e..cd948a9 100644 --- a/src/routes/proxy.ts +++ b/src/routes/proxy.ts @@ -95,7 +95,7 @@ proxyRoutes.post( const secretTypes = secretsResult.matches.map((m) => m.type); const secretTypesStr = secretTypes.join(","); - // Block action - return 422 error + // Block action - return 400 error if (config.secrets_detection.action === "block") { // Set headers before returning error c.header("X-PasteGuard-Secrets-Detected", "true");