Welcome to the demo session.
This conversation demonstrates how sensitive information is displayed when you share a session via Chats Share.
Model: claude-sonnet-4-6
How does the redaction work? Does /clawpage handle it automatically?
The /clawpage skill attempts to redact automatically. When you run /clawpage, it will:
- Replace detected API keys, tokens, and passwords with
REDACTED - Replace detected hostnames, IPs, and URLs with
REDACTED - Replace detected credentials in connection strings with
REDACTED
However, AI-powered redaction is not 100% reliable. The skill might:
- Miss unusual variable names or context-specific values
- Misjudge something as non-sensitive when it's actually sensitive
- Fail to detect information in comments or error messages
Always manually review before publishing.
So how can I ensure sensitive data is properly redacted?
Manual review + manual REDACTED marking is the safest approach.
- After running
/clawpage, open the generated YAML file - Search for anything sensitive: API keys, passwords, tokens, internal URLs, IPs, customer data
- Manually replace any questionable content with
REDACTED - Use
REDACTEDconsistently — the UI specifically recognizes this marker and applies special styling
When the UI sees REDACTED (the word REDACTED inside square brackets), it renders with distinct styling. Anything else won't get the special treatment.
(Note: this page auto-renders REDACTED to the styled version — in your YAML file, literally type the characters: left bracket, R-E-D-A-C-T-E-D, right bracket)
What about the GitHub workflow? How do I review before publishing?
Here's the typical flow:
- Run
/clawpagein your conversation — the skill exports and attempts to redact - Create a PR to your Chats Share repository — this lets you review changes before merging
- Manually review the YAML file in the PR — check for anything missed
- Manually add
REDACTEDto anything that looks sensitive - Merge the PR — the site auto-deploys and your chat is live
Critical: Make sure your repository is private. If it's public, anyone can view the raw YAML file at your GitHub repository history and see the original unredacted data.
The rendered page (/chats/your-session) is safe — only the YAML source contains the original values.
So I need to: run /clawpage, manually review the YAML, add REDACTED where needed, and keep my repo private. Got it!
Exactly. To summarize:
- ⚠️ AI redaction isn't perfect — always verify what /clawpage produces
- ✅ Manual REDACTED marking — the UI specifically recognizes
REDACTEDin brackets - ✅ Visual distinction —
REDACTEDgets a red background, border, and glowing label - ✅ Review before merging — use GitHub PR workflow to check YAML first
- ⚠️ Keep YAML sources private — the rendered page is safe, but raw YAML contains original data
- ⚠️ Use a private GitHub repo — otherwise anyone can access the unredacted YAML directly
This demo session uses REDACTED placeholders, so you can see the effect. Try viewing the page — the redactions will be clearly styled!