Currently, when DETAILED_LOGGING=true , the Port Agent logs sensitive secrets in cleartext if they are injected into self-service actions using {{ .secrets.* }} . For example, an Authorization header containing a bearer token is rendered directly into the container logs in plaintext. The current workaround is to set DETAILED_LOGGING=false , which prevents the exposure of secrets but also removes valuable troubleshooting and observability data. Customers should not have to choose between secure logging and detailed operational visibility. Even with detailed logging enabled, sensitive values such as Authorization headers, API keys, tokens, passwords, and any values originating from {{ .secrets.* }} should automatically be redacted or obfuscated before being written to logs. We would like to request a feature enhancement that introduces automatic secret masking/redaction within Port Agent logs. For example, values could appear as [REDACTED] or ****** while still preserving request structure, metadata, and debugging context. This would improve security, help meet compliance requirements, and allow customers to safely keep detailed logging enabled without risking credential exposure.