Requestly is a completely open-source tool. So we take security and privacy concerns very seriously. Our source code is freely available for inspection on GitHub. This transparency allows developers to verify the security measures implemented in the tool, providing an additional layer of trust and security
Infrastructure
- Cloud Storage: Requestly uses Firebase as its cloud storage provider, ensuring that all data is securely stored. It employs encryption in transit through HTTPS/TLS protocols, guaranteeing the safety of your data.
- Browser Extension: Requestly's browser extension conducts all network-level processing locally on your device. This means that no network data ever leaves your system during this process, ensuring your data's privacy and security. You can review the implementation details here.
- Desktop App Security: The desktop app operates a local proxy server responsible for managing all network modifications. Similar to the browser extension, this setup ensures that no network data is transmitted outside of your system. You can examine the implementation details here.
- Session Recording: Requestly employs robust security measures to safeguard session replay functionality. These measures include local storage of data, strict avoidance of capturing sensitive information, and secure storage of configuration settings. Detailed information about the implementation can be found here.
SOC 2 Compliance
We are currently in the process of SOC 2 compliance. We will be happy to share further details on this upon request. You can email [email protected] to request the further details