Your credentials stay local,
encrypted, and private.
Built with security as a core principle, not an afterthought. Zero telemetry, Keychain integration, and complete transparency.
"We sell software, not your data."
How credentials get leaked
- Plain text storage in config files
- Keys copied to clipboard and forgotten
- Passwords in shell history
- Telemetry capturing sensitive data
- Verbose logging exposing secrets
How we protect you
- Credentials stored in macOS Keychain
- Zero telemetry or analytics
- Secure memory clearing
- Host key verification
- Code signature validation
Security Architecture
Multiple layers of protection for your infrastructure access.
macOS Keychain Integration
All SSH keys and passwords are stored in macOS Keychain with AES-256 encryption. Your credentials are protected by your macOS login password and never stored in plain text. Access requires biometric authentication or your system password.
Zero Telemetry
No tracking, no analytics, no data collection. Your tunnel configurations, connection history, and usage patterns stay completely private on your device.
Host Key Verification
Strict SSH host key verification is enabled by default. Storm Tunnel warns you if a server's fingerprint changes, protecting against man-in-the-middle attacks.
Code Signature Validation
External binaries like AWS Session Manager plugin are validated with Apple code signatures before execution, preventing malicious code injection.
Secure Memory Handling
Sensitive data like passwords and private keys are cleared from memory immediately after use, minimizing exposure time.
Minimal Permissions
Storm Tunnel requests only the permissions necessary for its core functionality.
Revoke permissions anytime via macOS System Settings → Privacy & Security → Files and Folders.
Third-Party Services
Minimal dependencies, carefully selected for security and privacy compliance.
LemonSqueezy
License validation and payment processing. We never see or store your payment information.
- HTTPS-only communication
- No personal data stored in app
- Payment handled exclusively by LemonSqueezy
AWS SSM Plugin
Optional component for AWS infrastructure tunnel connections. Developed and signed by Amazon.
- Code signature verified before execution
- Uses AWS IAM authentication
- Credentials managed through AWS CLI/SSO
Found a Vulnerability?
We respond to security reports within 24 hours. Please report vulnerabilities privately.
Built with proven security technologies
Questions About Security?
We're committed to transparency. If you have questions about our security practices, please reach out.