Skip to main content
Chatledger is highly configurable through VS Code settings. You can access these settings by opening the Settings editor (Ctrl+,) and searching for “Chatledger”.

Settings Reference

chatledger.enabled
boolean
default:"false"
Enable or disable the automatic conversation export feature. When disabled, manual exports via commands still work.
chatledger.exportDirectory
string
default:".chatledger"
The directory where exported trajectories will be saved, relative to the workspace root.
chatledger.pollInterval
number
default:"5"
How frequently (in minutes) the extension checks for new or updated conversations. Allowed range: 2-120 minutes.
chatledger.censorSensitiveContent
boolean
default:"false"
If enabled, detected sensitive content (like API keys) will be replaced with ***CENSORED*** in the exported files.
chatledger.scanCodeBlocks
boolean
default:"true"
Whether to scan inside fenced code blocks for sensitive content. Disabling this can reduce false positives in example code.
chatledger.additionalSensitivePatterns
array
default:"[]"
A list of custom regex patterns to supplement the built-in sensitive content detection.

Example Configuration

You can configure Chatledger in your settings.json file. Here is a comprehensive example:
settings.json
{
  "chatledger.enabled": true,
  "chatledger.exportDirectory": ".chatledger",
  "chatledger.pollInterval": 5,
  "chatledger.censorSensitiveContent": true,
  "chatledger.scanCodeBlocks": false,
  "chatledger.additionalSensitivePatterns": [
    "company_secret_\\w+",
    "internal_api_key_\\d+"
  ]
}

Sensitive Content Detection

Chatledger comes with 9 built-in patterns to detect common secrets such as:
  • API Keys (e.g., OpenAI sk-*)
  • AWS Credentials
  • Private Keys
  • JWT Tokens
  • Passwords in connection strings
Use the Chatledger Security view in the Activity Bar to review and manage detected sensitive content.