Comprehensive security measures and privacy protection for WebSage users
π‘οΈ Security Features β’ π¨ Report Issues β’ π Best Practices β’ ποΈ Architecture
|
|
WebSage is designed with security and privacy as core principles:
- Local Storage Only: All API keys and conversation data stored locally in browser
- No External Tracking: Zero analytics, telemetry, or user behavior tracking
- HTTPS Only: All API communications use secure HTTPS connections
- Client-Side Processing: NLP analysis performed locally without external services
- No Data Transmission: User data never sent to WebSage servers (we don't have any)
- Encrypted Storage: API keys stored using Chrome's secure storage APIs
- Never Exposed: Keys never appear in DOM, console logs, or network requests
- User Controlled: Users manage their own API keys directly with providers
- Secure Transmission: Keys only sent directly to respective AI providers over HTTPS
- Input Sanitization: All user inputs sanitized before processing
- XSS Prevention: Content Security Policy and safe DOM manipulation
- Injection Protection: Parameterized queries and safe string handling
- Context Isolation: Extension runs in isolated context from web pages
- Minimal Permissions: Only requests necessary permissions for functionality
- Host Restrictions: Limited to HTTPS websites only
- No Third-Party Scripts: All code bundled with extension, no external dependencies
- Secure Headers: Proper security headers in all network requests
We take security vulnerabilities seriously. If you discover a security issue, please follow these guidelines:
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please:
- Email: Send details to our security team (create a private issue or contact maintainers)
- Include: Detailed description of the vulnerability
- Provide: Steps to reproduce the issue
- Specify: Affected versions and potential impact
- Suggest: Possible mitigation or fix if known
- Vulnerability Type: XSS, injection, data exposure, etc.
- Affected Components: Which files or features are impacted
- Attack Vector: How the vulnerability could be exploited
- Impact Assessment: Potential consequences of exploitation
- Proof of Concept: Safe demonstration of the issue
- Environment: Browser version, OS, extension version
- Initial Response: Within 48 hours of report
- Assessment: Security team will evaluate within 1 week
- Fix Development: Critical issues addressed within 2 weeks
- Release: Security patches released as soon as possible
- Disclosure: Public disclosure after fix is available
We appreciate security researchers who help keep WebSage secure:
- Acknowledgment: Recognition in security advisories (if desired)
- Hall of Fame: Listed in our security contributors section
- Coordination: Work with you on responsible disclosure timeline
- Use Dedicated Keys: Create separate API keys for WebSage
- Regular Rotation: Rotate API keys periodically
- Monitor Usage: Check API usage for unexpected activity
- Revoke if Compromised: Immediately revoke and replace compromised keys
- Trusted Sites: Use WebSage primarily on trusted websites
- Sensitive Data: Avoid sharing sensitive information in chats
- Public Computers: Don't save API keys on shared/public computers
- Regular Updates: Keep the extension updated to latest version
- Review Permissions: Understand what permissions the extension requests
- Clear Data: Regularly clear conversation history if desired
- Monitor Activity: Be aware of what data you're sharing with AI providers
- Read Policies: Review AI provider privacy policies and terms
βββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
β Web Page β β WebSage β β AI Provider β
β (Isolated) βββββΊβ Extension βββββΊβ (HTTPS Only) β
β β β (Sandboxed) β β β
βββββββββββββββββββ ββββββββββββββββββββ βββββββββββββββββββ
β
βΌ
ββββββββββββββββββββ
β Local Storage β
β (Encrypted) β
ββββββββββββββββββββ
- User Input β Sanitized and validated
- Page Content β Extracted safely with content scripts
- API Requests β Sent directly to AI providers over HTTPS
- Responses β Sanitized before display
- Storage β Encrypted local storage only
- OWASP Guidelines: Following web application security best practices
- Chrome Extension Security: Adhering to Chrome's security requirements
- Manifest V3: Using latest security-focused extension platform
- CSP: Content Security Policy implementation
- No Data Collection: We don't collect any user data
- GDPR Friendly: No personal data processing by WebSage
- User Control: Users have full control over their data
- Transparency: Open source code for full transparency
- Automatic Updates: Chrome automatically updates the extension
- Security Patches: Critical security fixes released immediately
- Version Notifications: Users notified of important security updates
- Changelog: All security fixes documented in changelog
- GitHub Releases: Watch repository for security announcements
- Security Advisories: Subscribe to GitHub security advisories
- Community: Join community discussions for security updates
For security-related questions or concerns:
- Security Issues: Use private reporting methods
- General Questions: Create public GitHub issues
- Community: Join discussions in GitHub Discussions
Remember: Security is a shared responsibility. Help us keep WebSage secure by following best practices and reporting any concerns promptly.
Last Updated: 2025