Description
As a user, I want to be able to start the Kubernetes MCP Server providing a configuration option that will redact sensitive information from responses (tool calls, resources, etc.), so that sensitive information is not shared with the LLM or the MCP client.
- Configuration flag?
--redact??
- Resources to be redacted (TBD):
- If possible, reuse built-in Kubernetes tooling?