Dynamic secret scrubbing allows you to retrieve secrets at runtime from external vaults (like Azure Key Vault, AWS Secrets Manager, or HashiCorp Vault) while automatically removing those sensitive values from logs, traces, screenshots with text, and report trees. This is particularly useful for organizations that prefer not to store secrets in Checkly and want to maintain their existing secret management infrastructure. Set environment variables with theDocumentation Index
Fetch the complete documentation index at: https://checkly-422f444a-sync-playwright-reporter-changelog-v1-5-0.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
CHECKLY_SECRET_* prefix and the runtime will detect and scrub those values from all check results.
How it works
Assign values toprocess.env.CHECKLY_SECRET_* in your check code:
- Check logs
- Trace files
- Screenshots containing text
- Report trees
Supported patterns
Limitations
- Check types: Only works in browser and multistep checks
- Value format: Must be a string (empty strings,
null,undefined, numbers, objects, and arrays are ignored) - Size limit: Values cannot exceed 128KB (~128,000 characters)
- Pattern-based detection: Scrubbing works by detecting code and output structures. Complex or unconventional Playwright usage may fall outside of this detection. Follow the documented patterns for reliable scrubbing.
Example usage
Runtime compatibility
This feature is available from runtime2024.09 onwards. For private locations running older agent versions, contact support for access.