[GH-ISSUE #5873] [feature]: Encrypt locally stored secrets #2312

Open
opened 2026-03-16 23:55:28 +03:00 by kerem · 2 comments
Owner

Originally created by @thmbck on GitHub (Feb 12, 2026).
Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/5873

Is there an existing issue for this?

  • I have searched the existing issues

Summary

In Hoppscotch desktop, secrets defined in environments, collections, or entered in the authorization section of a request, are stored in plain text at a well-known location in a world-readable file (hoppscotch.hoppscotch.store on macOS). This sensitive information should be protected by encryption with a key provided by the user. The Hoppscotch app should prompt the user for the key to decrypt the secrets when needed or upon startup.

Why should this be worked on?

According to the Hoppscotch documentation, "It is expected that the user will populate the value of the variable at runtime." However, it is impossible to enter a secret, such as an access token, without Hoppscotch storing it as plain text in a public file. This is especially concerning when a computer is shared. Encryption is an easy way to keep secrets more secure.

Originally created by @thmbck on GitHub (Feb 12, 2026). Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/5873 ### Is there an existing issue for this? - [x] I have searched the existing issues ### Summary In Hoppscotch desktop, secrets defined in environments, collections, or entered in the authorization section of a request, are stored in plain text at a well-known location in a world-readable file (hoppscotch.hoppscotch.store on macOS). This sensitive information should be protected by encryption with a key provided by the user. The Hoppscotch app should prompt the user for the key to decrypt the secrets when needed or upon startup. ### Why should this be worked on? According to the Hoppscotch documentation, "It is expected that the user will populate the value of the variable at runtime." However, it is impossible to enter a secret, such as an access token, without Hoppscotch storing it as plain text in a public file. This is especially concerning when a computer is shared. Encryption is an easy way to keep secrets more secure.
Author
Owner

@thmbck commented on GitHub (Feb 12, 2026):

Even more concerning is that the secrets are logged unmasked in the restHistory section in hoppscotch.hoppscotch.store.

<!-- gh-comment-id:3891020103 --> @thmbck commented on GitHub (Feb 12, 2026): Even more concerning is that the secrets are logged unmasked in the restHistory section in hoppscotch.hoppscotch.store.
Author
Owner

@bittoby commented on GitHub (Feb 21, 2026):

@jamesgeorge007 @CuriousCorrelation Hi, I'm interested in this project. I'd like to contribute. Can I pick this up?
thank you

<!-- gh-comment-id:3938517955 --> @bittoby commented on GitHub (Feb 21, 2026): @jamesgeorge007 @CuriousCorrelation Hi, I'm interested in this project. I'd like to contribute. Can I pick this up? thank you
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/hoppscotch#2312
No description provided.