Spekra
Docs

Getting Started

  • Overview
  • Playwright
  • Jest
  • Vitest

Core Concepts

  • Flaky Tests
  • Stability Metrics
  • Test Identity

Reporters

  • Playwright
  • Playwright Config
  • Jest
  • Jest Config
  • Vitest
  • Vitest Config

Platform

  • Dashboard
  • Flaky Tests View
  • Test Runs
  • API Keys
  • Rate Limits

CI/CD

  • Overview
  • GitHub Actions
  • GitLab CI

Security

  • Overview
  • Data Handling
  • Compliance

Troubleshooting

  • Overview
  • Connection Issues
  • Missing Data
DocsSecurity

Security

Security is important to us, even as a free tool. This document outlines our security practices and data handling.

Quick Links

Data Handling

What data we collect, how we store it, and retention policies.

Compliance

Our security practices and current compliance status.

Security Overview

Data We Collect

Spekra collects only the data necessary to provide test observability:

Data TypePurposeRetention
Test resultsTrack pass/fail/flaky status30 days
Test metadataFile paths, suite names, tags30 days
Error messagesDebug test failures30 days
Playwright tracesDebug failures with full context30 days
Git metadataBranch, commit, author30 days
CI metadataJob URLs, workflow names30 days

Data We Do NOT Collect

  • Source code or test code content
  • Environment variables or secrets
  • Personal user data beyond authentication

Minimal data collection

We only collect what's necessary to provide the service.

Infrastructure

Hosting

  • Web app: Hosted on Vercel
  • Database: Supabase (PostgreSQL)
  • Storage: Supabase Storage for trace files
  • All data encrypted in transit (TLS)

Database Security

  • Row-level security (RLS) policies
  • No direct database access from internet
  • Parameterized queries (no SQL injection)

Access Control

  • Role-based access within organizations
  • API keys scoped to single organization
  • API keys hashed, never stored in plain text

API Security

Authentication

All API requests require an API key:

x-api-key: sk_your_api_key_here

API keys are:

  • Scoped to a single organization
  • Revocable at any time
  • Never stored in plain text

Rate Limiting

Basic rate limiting is in place to prevent abuse.

Development Practices

  • Input validation on all endpoints
  • Output encoding to prevent XSS
  • Dependency updates via Dependabot
  • No secrets in code or logs

Reporting Security Issues

If you discover a security vulnerability:

  1. Do not disclose it publicly
  2. Open a private security advisory on GitHub
  3. We'll review and respond as quickly as possible

Next Steps

  • Data Handling - Detailed data policies
  • Compliance - Current compliance status
  • API Keys - Key management

Previous

GitLab CI

Next

Data Handling