Security First

Your Torn API key is sensitive. Here's exactly how we protect it and your data.

AES-256-GCM Encryption

All API keys are encrypted at rest using AES-256-GCM, the same standard used by banks and governments. Keys are never stored in plain text.

Two-Factor Authentication

Protect your account with TOTP-based 2FA using Google Authenticator, Authy, or any compatible app.

Limited API Key Only

We only require a Limited Access key — no Full Access needed. We cannot make trades, send money, or perform any actions on your Torn account.

Session Security

Sessions use signed JWTs with automatic expiration. Cookies are httpOnly, Secure, and SameSite to prevent XSS and CSRF attacks.

No Password Storage

We never ask for or store your Torn password. Authentication is done exclusively through the Torn API using your API key.

Automated Security Audits

Every code change runs through 16 automated security checks including static analysis (Semgrep), secret scanning (TruffleHog), dependency audits, and custom SAST rules.

Security Headers

HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy headers protect against common web attacks.

Data Isolation

Each faction's data is isolated by tenant ID. Members can only access their own faction's data. Alliance data requires explicit membership.

Continuous Security Pipeline

Every commit triggers automated security checks. Nothing reaches production without passing all gates.

Dependency Audit
npm audit
Secret Scanning
TruffleHog
Static Analysis
Semgrep
SQL Injection
Custom SAST
Auth Bypass
Route analysis
SSRF Detection
Pattern scan
XSS Prevention
CSP + Semgrep
Prototype Pollution
Pattern scan
Path Traversal
FS audit
License Compliance
license-checker
TypeScript Strict
tsc --strict
Security Headers
Config audit
Hardcoded Secrets
Regex scan
Outdated Deps
npm outdated
E2E Security Tests
Playwright
Rate Limiting
Code audit

What We Never Do

Store your Torn password
Require Full Access API keys
Make trades or send money
Share your data with third parties
Store API keys in plain text
Access to your account
Sell or monetize your personal data
Log your API key in server logs

Found a vulnerability? Contact us on the Torn Forums.