Skip to main content

Documentation Index

Fetch the complete documentation index at: https://opensre.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

Overview

The OpenSRE interactive shell persists every line you type to a history file so up-arrow recall and /history work across sessions. Incident prompts can include sensitive identifiers and tokens, so the shell:
  • redacts known token shapes before each entry is written to disk
  • supports disabling persistence entirely (memory-only mode)
  • caps how many entries are kept (oldest pruned)
  • offers a one-shot /history clear to wipe the file on demand
The history file lives at ~/.config/opensre/interactive_history.

Defaults

SettingDefaultEffect
PersistenceonLines you type are appended to the history file.
RedactiononKnown token shapes are replaced with [REDACTED:<kind>] before writing.
Retention cap5000 entriesOlder entries are pruned when the cap is exceeded.

Redaction patterns

The built-in pattern set targets token shapes that are unique enough to keep false positives on natural-language incident text very low. Each match is replaced with a labeled placeholder.
KindExamples
aws_keyAKIA…, ASIA…
aws_secretaws_secret_access_key=…
github_patghp_…, github_pat_…
anthropic_keysk-ant-…
openai_keysk-…
slack_tokenxoxb-…, xoxp-…, xoxa-…
stripe_keysk_live_…, sk_test_…
bearerBearer <opaque> headers
jwteyJ… three-segment tokens
password--password=…, password=…
private_keyPEM-encoded private keys
Redaction applies only to persistent history. The line you typed is still passed to OpenSRE’s normal pipeline as you typed it.

Slash commands

CommandEffect
/historyShow all persisted entries.
/history clearWipe the history file. Up-arrow recall resets on next launch.
/history offPause persistence for this session. New entries are not written.
/history onResume persistence for this session.
/history retention <N>Keep at most N entries on disk. Prunes immediately.
/privacyShow current persistence + redaction state, retention cap, and threat model.

Configuration

Settings resolve from (highest wins):
  1. Environment variables
  2. The interactive.history block in ~/.config/opensre/config.yml
  3. Built-in defaults

Environment variables

VariableDefaultEffect
OPENSRE_HISTORY_ENABLED1Set to 0/false/off to skip persistence entirely (in-memory only).
OPENSRE_HISTORY_REDACT1Set to 0/false/off to disable redaction (raw FileHistory).
OPENSRE_HISTORY_MAX_ENTRIES5000Non-negative integer. 0 disables the cap (unlimited).

Config file

interactive:
  history:
    enabled: true
    redact: true
    max_entries: 5000

Threat model

The history file is plain text on local disk at ~/.config/opensre/interactive_history, with the user’s default file permissions. Built-in redaction targets common token shapes only — it is not a substitute for proper secret handling. Treat the file as confidential and be aware:
  • A determined attacker with read access to your home directory can still read pre-existing entries written before redaction was enabled.
  • Redaction cannot detect tokens that look like normal text (for example a natural-language password). Don’t paste secrets you wouldn’t be comfortable seeing in a system log.
  • Custom redaction patterns are not yet supported in v1. If you need to redact internal token shapes, use /history off for that session and run /history clear afterwards.
For the strongest posture: set OPENSRE_HISTORY_ENABLED=0, accept the loss of cross-session up-arrow recall, and rely on the in-memory ring instead.