Problem / Use Case
Building Block Definitions can produce outputs — such as connection strings, API keys, tokens, or passwords — that are sensitive by nature. Currently, all outputs are treated equally and displayed in plain text wherever they are surfaced (e.g. in the meshStack UI, in chained building block configurations, or in audit logs).
Platform engineers who provision infrastructure via Building Blocks often generate secrets as outputs (e.g. database credentials, service account keys, storage access tokens). There is no way to flag these values as sensitive so they are protected from casual exposure in the UI or stored securely.
Value / Impact
Marking an output as sensitive would allow meshStack to:
  • Mask the value in the UI
    (e.g. show
    ••••••
    with a reveal toggle) so it is not exposed to users who do not need it
  • Prevent the value from appearing in audit logs
    or being serialized into non-encrypted storage
  • Signal to downstream consumers
    (e.g. parent building blocks referencing this output) that the value should be handled securely
This is especially important for compliance-conscious customers who need to demonstrate that secrets generated during infrastructure provisioning are not leaked through the platform UI.
Context / Links