| Version | Supported |
|---|---|
| Latest | Yes |
If you discover a security vulnerability in OrcaFlow, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email: security@techtide.ai
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and aim to provide a fix or mitigation within 7 days for critical issues.
OrcaFlow is designed with a local-first security model:
- All data stays local — Credentials, usage data, and logs are stored only on your machine
- No telemetry — No analytics SDKs, tracking pixels, or beacons
- Cloud sync disabled — Remote sync features are disabled by default
- Header masking — Sensitive headers (Authorization, API keys, tokens) are masked in request logs
- No tunnel by default — Cloudflare tunnel feature is disabled
When running OrcaFlow:
- Change the default password — Update
INITIAL_PASSWORDin your.env - Set a JWT secret — Configure
JWT_SECRETinstead of using the auto-generated default - Use API keys — Enable
REQUIRE_API_KEY=trueif exposing the endpoint beyond localhost - Keep
.envsecure — Never commit your.envfile (it's gitignored by default) - Review
data/db.json— This file contains provider credentials in plaintext; keep it secure
For security issues in the core 9Router engine, please also report to the 9Router project.