Security Concern: API Key Exposed in Execution Debug Logs for Pinecone Query

The Pinecone API key is displayed in plain text within execution debug logs when running a Pinecone query step. Sensitive credentials should be masked or redacted, but the full API key appears in request headers during log inspection. This creates a potential security risk, especially in shared workspaces or when logs are exported or reviewed by multiple users, and does not align with common security best practices.

Media:

Steps to Reproduce:

  1. Configure a Pinecone query step with an API key.

  2. Execute the workflow.

  3. Open the execution/debug logs.

  4. Inspect the request headers.

Expected Result:
API keys and other sensitive headers (e.g., Api-Key) should be masked or redacted in logs (for example: pcsk_****abcd) and never displayed in full.

Actual Result:
The full Pinecone API key is visible in plain text within the execution debug logs when inspecting the HTTP request.

Thanks for reporting. We will look into it.