The net/http/pprof endpoints include stack traces with integer arguments, which can leak sensitive information depending on the settings. We should mention that in the docs.

Comment From: FiloSottile

Maybe we should even hide the variables from the net/http/pprof output, or make them optional.

Comment From: rleungx

Is there any update on this issue?

Comment From: mknyszek

I think we have come to the conclusion that net/http/pprof just provides so many things that might contain sensitive information, that it just shouldn't be exposed on an externally-facing endpoint. #42834 is closely related.

I think in the short term, what we should do, is add a warning to the top of the package documentation to this effect, and also provide an example of how to set up net/http/pprof over something like a Unix domain socket. (Echoing stuff like https://eli.thegreenplace.net/2019/unix-domain-sockets-in-go/.)