We take security seriously. If you discover a security vulnerability, please report it responsibly:
- Open a GitHub Issue with the "Security" label
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Keep Updated: Always use the latest version
- Secure Data: Store sensitive API keys in environment variables
- Network Security: Use HTTPS for API requests
- Access Control: Restrict access to your Requesto instance
- Dependencies: Regularly update dependencies
- Code Review: Review all pull requests for security issues
- Input Validation: Validate all user inputs
- Secrets: Never commit API keys, tokens, or credentials
- All data is stored locally in JSON files, organized by workspace
- Sensitive data is not encrypted at rest (use OS-level encryption)
- OAuth client secrets are stored separately from workspace data in a local-only directory
- OAuth access tokens are stored client-side and never persisted server-side
- Local first approach
- Backend executes API requests on your behalf
- Requests history can be found in the session console
- No data is sent to external servers
- Context isolation is enabled
- Node integration is disabled in renderer
- Web security is enforced
We will disclose security issues through:
- GitHub Security Advisories
- Release notes
- Documentation updates