Case: Privacy Guard Config Read¶
Star on GitHub Compare Workflows Case Library
When to Use¶
Use this before sharing config files that may include keys, tokens, cookies, or session-like data.
Run¶
Check status:
aios privacy status
Read sensitive file via redaction path:
aios privacy read --file config/browser-profiles.json
Optional local model enhancement:
aios privacy ollama-on
Evidence¶
- Output is redacted and does not expose raw secrets.
- Config intent remains readable for troubleshooting/review.
privacy statusconfirms strict mode is enabled.
Why This Matters¶
Teams often leak secrets by pasting raw config into prompts. Privacy Guard turns risky reads into a repeatable safe default.