diff --git a/dist/restore-only/index.js b/dist/restore-only/index.js
index b8b9784..72a9dc3 100644
--- a/dist/restore-only/index.js
+++ b/dist/restore-only/index.js
@@ -9015,13 +9015,24 @@ exports.maskSecretUrls = exports.maskSigUrl = void 0;
 const core_1 = __nccwpck_require__(9728);
 /**
  * Masks the `sig` parameter in a URL and sets it as a secret.
- * @param url The URL containing the `sig` parameter.
- * @returns A masked URL where the sig parameter value is replaced with '***' if found,
- *          or the original URL if no sig parameter is present.
+ *
+ * @param url - The URL containing the signature parameter to mask
+ * @remarks
+ * This function attempts to parse the provided URL and identify the 'sig' query parameter.
+ * If found, it registers both the raw and URL-encoded signature values as secrets using
+ * the Actions `setSecret` API, which prevents them from being displayed in logs.
+ *
+ * The function handles errors gracefully if URL parsing fails, logging them as debug messages.
+ *
+ * @example
+ * ```typescript
+ * // Mask a signature in an Azure SAS token URL
+ * maskSigUrl('https://example.blob.core.windows.net/container/file.txt?sig=abc123&se=2023-01-01');
+ * ```
  */
 function maskSigUrl(url) {
     if (!url)
-        return url;
+        return;
     try {
         const parsedUrl = new URL(url);
         const signature = parsedUrl.searchParams.get('sig');
@@ -9029,17 +9040,33 @@ function maskSigUrl(url) {
             (0, core_1.setSecret)(signature);
             (0, core_1.setSecret)(encodeURIComponent(signature));
             parsedUrl.searchParams.set('sig', '***');
-            return parsedUrl.toString();
         }
     }
     catch (error) {
         (0, core_1.debug)(`Failed to parse URL: ${url} ${error instanceof Error ? error.message : String(error)}`);
     }
-    return url;
 }
 exports.maskSigUrl = maskSigUrl;
 /**
- * Masks any URLs containing signature parameters in the provided object
+ * Masks sensitive information in URLs containing signature parameters.
+ * Currently supports masking 'sig' parameters in the 'signed_upload_url'
+ * and 'signed_download_url' properties of the provided object.
+ *
+ * @param body - The object should contain a signature
+ * @remarks
+ * This function extracts URLs from the object properties and calls maskSigUrl
+ * on each one to redact sensitive signature information. The function doesn't
+ * modify the original object; it only marks the signatures as secrets for
+ * logging purposes.
+ *
+ * @example
+ * ```typescript
+ * const responseBody = {
+ *   signed_upload_url: 'https://blob.core.windows.net/?sig=abc123',
+ *   signed_download_url: 'https://blob.core/windows.net/?sig=def456'
+ * };
+ * maskSecretUrls(responseBody);
+ * ```
  */
 function maskSecretUrls(body) {
     if (typeof body !== 'object' || body === null) {
diff --git a/dist/restore/index.js b/dist/restore/index.js
index 38cc807..e1c1af4 100644
--- a/dist/restore/index.js
+++ b/dist/restore/index.js
@@ -9015,13 +9015,24 @@ exports.maskSecretUrls = exports.maskSigUrl = void 0;
 const core_1 = __nccwpck_require__(9728);
 /**
  * Masks the `sig` parameter in a URL and sets it as a secret.
- * @param url The URL containing the `sig` parameter.
- * @returns A masked URL where the sig parameter value is replaced with '***' if found,
- *          or the original URL if no sig parameter is present.
+ *
+ * @param url - The URL containing the signature parameter to mask
+ * @remarks
+ * This function attempts to parse the provided URL and identify the 'sig' query parameter.
+ * If found, it registers both the raw and URL-encoded signature values as secrets using
+ * the Actions `setSecret` API, which prevents them from being displayed in logs.
+ *
+ * The function handles errors gracefully if URL parsing fails, logging them as debug messages.
+ *
+ * @example
+ * ```typescript
+ * // Mask a signature in an Azure SAS token URL
+ * maskSigUrl('https://example.blob.core.windows.net/container/file.txt?sig=abc123&se=2023-01-01');
+ * ```
  */
 function maskSigUrl(url) {
     if (!url)
-        return url;
+        return;
     try {
         const parsedUrl = new URL(url);
         const signature = parsedUrl.searchParams.get('sig');
@@ -9029,17 +9040,33 @@ function maskSigUrl(url) {
             (0, core_1.setSecret)(signature);
             (0, core_1.setSecret)(encodeURIComponent(signature));
             parsedUrl.searchParams.set('sig', '***');
-            return parsedUrl.toString();
         }
     }
     catch (error) {
         (0, core_1.debug)(`Failed to parse URL: ${url} ${error instanceof Error ? error.message : String(error)}`);
     }
-    return url;
 }
 exports.maskSigUrl = maskSigUrl;
 /**
- * Masks any URLs containing signature parameters in the provided object
+ * Masks sensitive information in URLs containing signature parameters.
+ * Currently supports masking 'sig' parameters in the 'signed_upload_url'
+ * and 'signed_download_url' properties of the provided object.
+ *
+ * @param body - The object should contain a signature
+ * @remarks
+ * This function extracts URLs from the object properties and calls maskSigUrl
+ * on each one to redact sensitive signature information. The function doesn't
+ * modify the original object; it only marks the signatures as secrets for
+ * logging purposes.
+ *
+ * @example
+ * ```typescript
+ * const responseBody = {
+ *   signed_upload_url: 'https://blob.core.windows.net/?sig=abc123',
+ *   signed_download_url: 'https://blob.core/windows.net/?sig=def456'
+ * };
+ * maskSecretUrls(responseBody);
+ * ```
  */
 function maskSecretUrls(body) {
     if (typeof body !== 'object' || body === null) {
diff --git a/dist/save-only/index.js b/dist/save-only/index.js
index 5f17fde..78bcf8a 100644
--- a/dist/save-only/index.js
+++ b/dist/save-only/index.js
@@ -9015,13 +9015,24 @@ exports.maskSecretUrls = exports.maskSigUrl = void 0;
 const core_1 = __nccwpck_require__(9728);
 /**
  * Masks the `sig` parameter in a URL and sets it as a secret.
- * @param url The URL containing the `sig` parameter.
- * @returns A masked URL where the sig parameter value is replaced with '***' if found,
- *          or the original URL if no sig parameter is present.
+ *
+ * @param url - The URL containing the signature parameter to mask
+ * @remarks
+ * This function attempts to parse the provided URL and identify the 'sig' query parameter.
+ * If found, it registers both the raw and URL-encoded signature values as secrets using
+ * the Actions `setSecret` API, which prevents them from being displayed in logs.
+ *
+ * The function handles errors gracefully if URL parsing fails, logging them as debug messages.
+ *
+ * @example
+ * ```typescript
+ * // Mask a signature in an Azure SAS token URL
+ * maskSigUrl('https://example.blob.core.windows.net/container/file.txt?sig=abc123&se=2023-01-01');
+ * ```
  */
 function maskSigUrl(url) {
     if (!url)
-        return url;
+        return;
     try {
         const parsedUrl = new URL(url);
         const signature = parsedUrl.searchParams.get('sig');
@@ -9029,17 +9040,33 @@ function maskSigUrl(url) {
             (0, core_1.setSecret)(signature);
             (0, core_1.setSecret)(encodeURIComponent(signature));
             parsedUrl.searchParams.set('sig', '***');
-            return parsedUrl.toString();
         }
     }
     catch (error) {
         (0, core_1.debug)(`Failed to parse URL: ${url} ${error instanceof Error ? error.message : String(error)}`);
     }
-    return url;
 }
 exports.maskSigUrl = maskSigUrl;
 /**
- * Masks any URLs containing signature parameters in the provided object
+ * Masks sensitive information in URLs containing signature parameters.
+ * Currently supports masking 'sig' parameters in the 'signed_upload_url'
+ * and 'signed_download_url' properties of the provided object.
+ *
+ * @param body - The object should contain a signature
+ * @remarks
+ * This function extracts URLs from the object properties and calls maskSigUrl
+ * on each one to redact sensitive signature information. The function doesn't
+ * modify the original object; it only marks the signatures as secrets for
+ * logging purposes.
+ *
+ * @example
+ * ```typescript
+ * const responseBody = {
+ *   signed_upload_url: 'https://blob.core.windows.net/?sig=abc123',
+ *   signed_download_url: 'https://blob.core/windows.net/?sig=def456'
+ * };
+ * maskSecretUrls(responseBody);
+ * ```
  */
 function maskSecretUrls(body) {
     if (typeof body !== 'object' || body === null) {
diff --git a/dist/save/index.js b/dist/save/index.js
index dc52682..b91c4cf 100644
--- a/dist/save/index.js
+++ b/dist/save/index.js
@@ -9015,13 +9015,24 @@ exports.maskSecretUrls = exports.maskSigUrl = void 0;
 const core_1 = __nccwpck_require__(9728);
 /**
  * Masks the `sig` parameter in a URL and sets it as a secret.
- * @param url The URL containing the `sig` parameter.
- * @returns A masked URL where the sig parameter value is replaced with '***' if found,
- *          or the original URL if no sig parameter is present.
+ *
+ * @param url - The URL containing the signature parameter to mask
+ * @remarks
+ * This function attempts to parse the provided URL and identify the 'sig' query parameter.
+ * If found, it registers both the raw and URL-encoded signature values as secrets using
+ * the Actions `setSecret` API, which prevents them from being displayed in logs.
+ *
+ * The function handles errors gracefully if URL parsing fails, logging them as debug messages.
+ *
+ * @example
+ * ```typescript
+ * // Mask a signature in an Azure SAS token URL
+ * maskSigUrl('https://example.blob.core.windows.net/container/file.txt?sig=abc123&se=2023-01-01');
+ * ```
  */
 function maskSigUrl(url) {
     if (!url)
-        return url;
+        return;
     try {
         const parsedUrl = new URL(url);
         const signature = parsedUrl.searchParams.get('sig');
@@ -9029,17 +9040,33 @@ function maskSigUrl(url) {
             (0, core_1.setSecret)(signature);
             (0, core_1.setSecret)(encodeURIComponent(signature));
             parsedUrl.searchParams.set('sig', '***');
-            return parsedUrl.toString();
         }
     }
     catch (error) {
         (0, core_1.debug)(`Failed to parse URL: ${url} ${error instanceof Error ? error.message : String(error)}`);
     }
-    return url;
 }
 exports.maskSigUrl = maskSigUrl;
 /**
- * Masks any URLs containing signature parameters in the provided object
+ * Masks sensitive information in URLs containing signature parameters.
+ * Currently supports masking 'sig' parameters in the 'signed_upload_url'
+ * and 'signed_download_url' properties of the provided object.
+ *
+ * @param body - The object should contain a signature
+ * @remarks
+ * This function extracts URLs from the object properties and calls maskSigUrl
+ * on each one to redact sensitive signature information. The function doesn't
+ * modify the original object; it only marks the signatures as secrets for
+ * logging purposes.
+ *
+ * @example
+ * ```typescript
+ * const responseBody = {
+ *   signed_upload_url: 'https://blob.core.windows.net/?sig=abc123',
+ *   signed_download_url: 'https://blob.core/windows.net/?sig=def456'
+ * };
+ * maskSecretUrls(responseBody);
+ * ```
  */
 function maskSecretUrls(body) {
     if (typeof body !== 'object' || body === null) {