Overview

At Requestly, security and privacy are our top priorities. We make sure that all your sensitive data stays on your device by default. Nothing is shared with our cloud unless you choose to save it there. This local-first philosophy ensures your data remains private and secure, giving you full control over what gets shared. Here's how we make that happen:

Open Source

Transparency is at the heart of Requestly. Our open-source codebase invites audits and contributions, fostering trust and accountability. Learn more about our open-source commitment.

Infrastructure

Requestly’s secure and reliable infrastructure undergoes regular updates and monitoring to prevent vulnerabilities and ensure robustness. Learn more about our infrastructure.

SOC 2 Type II

We adhere to SOC II standards, ensuring stringent practices for data protection, privacy, and operational excellence. Learn more about SOC II compliance.

API Client

The API Client offers secure communication through encryption and environment variable support, ensuring safe handling of sensitive information. Learn more about the API Client.

HTTP Rules

All HTTP Rules in Requestly are processed locally on your device. This ensures your data remains private and secure throughout debugging and testing workflows. Learn more about HTTP Rules.

HTTP Interceptor

Requestly's HTTP Interceptor is local-first, meaning all modifications and inspections happen directly on your device. This ensures your data never leaves your machine unless explicitly configured. Learn more about the HTTP Interceptor.

Mock/File Server

Securely test and simulate API responses using our Mock/File Server, which provides a protected environment for development. Learn more about the Mock/File Server.

Sessions

Requestly’s Sessions are saved locally first and only synced to the cloud when explicitly saved by the user. This ensures your data stays private by default. Learn more about Sessions.

Updated on