At Requestly, security and privacy are our top priorities. We make sure that all your sensitive data stays on your device by default. Nothing is shared with our cloud unless you choose to save it there. This local-first philosophy ensures your data remains private and secure, giving you full control over what gets shared. Here's how we make that happen:
Open Source
Transparency is at the heart of Requestly. Our open-source codebase invites audits and contributions, fostering trust and accountability. Learn more about our open-source commitment.
Infrastructure
Requestly’s secure and reliable infrastructure undergoes regular updates and monitoring to prevent vulnerabilities and ensure robustness. Learn more about our infrastructure.
SOC 2 Type II
We adhere to SOC II standards, ensuring stringent practices for data protection, privacy, and operational excellence. Learn more about SOC II compliance.
API Client
The API Client offers secure communication through encryption and environment variable support, ensuring safe handling of sensitive information. Learn more about the API Client.
HTTP Rules
All HTTP Rules in Requestly are processed locally on your device. This ensures your data remains private and secure throughout debugging and testing workflows. Learn more about HTTP Rules.
HTTP Interceptor
Requestly's HTTP Interceptor is local-first, meaning all modifications and inspections happen directly on your device. This ensures your data never leaves your machine unless explicitly configured. Learn more about the HTTP Interceptor.
Mock/File Server
Securely test and simulate API responses using our Mock/File Server, which provides a protected environment for development. Learn more about the Mock/File Server.
Sessions
Requestly’s Sessions are saved locally first and only synced to the cloud when explicitly saved by the user. This ensures your data stays private by default. Learn more about Sessions.