Privacy-First Philosophy
Kayston’s Forge is built on a foundational principle: your data is yours alone. Every tool runs entirely in your browser with zero server-side processing.Core Architecture
Fully Static Export
Kayston’s Forge is built with Next.js 14 usingoutput: 'export', which generates a completely static site:
- No Node.js server runtime
- No API routes that process data
- No server-side rendering of your input
- No backend database or logging
Even the hosting provider (Vercel) cannot intercept, log, or access the data you process in Kayston’s Forge.
Client-Side Processing
All 51 tools process data using JavaScript running in your browser:- Initial page load (HTML, CSS, JavaScript bundles)
- Font and icon assets from the same domain
- Service worker for offline PWA functionality (optional)
Security Headers
Every page is served with strict security headers enforced viavercel.json:
Content Security Policy (CSP)
- External scripts cannot be loaded from CDNs or third-party domains
- Connections are restricted to the same origin
- Iframes cannot embed Kayston’s Forge (clickjacking protection)
- No Flash, Java, or plugin content allowed
script-src 'unsafe-inline' is required for Next.js static export hydration. XSS protection relies on React’s built-in escaping and DOMPurify sanitization for previews.HTTP Strict Transport Security (HSTS)
Other Security Headers
X-Content-Type-Options: nosniff- Prevents MIME type sniffing attacks
- Prevents the site from being embedded in iframes (defense against clickjacking)
- Limits referrer information leakage when navigating to external sites
- Disables access to sensitive device APIs
Data Storage
Local Storage (Optional)
Kayston’s Forge uses browser storage for convenience features: IndexedDB (KaystonsForgeDB via Dexie)
- Per-tool history (last 50 operations per tool)
- Favorites
- User settings (theme, keyboard shortcuts)
- UI state (sidebar open/closed, active tool)
- Never leaves your device
- Can be cleared at any time via browser settings or the app’s settings panel
- Is not synchronized to cloud storage
- Is not accessible to other websites (same-origin policy)
No Cookies
Kayston’s Forge does not use cookies for tracking, authentication, or analytics.No Analytics
Unlike most web applications, Kayston’s Forge has:- No Google Analytics
- No Mixpanel, Segment, or similar tracking
- No heatmaps or session replay
- No error tracking services (like Sentry) that send data externally
- Which tools you use
- What data you process
- When you visit the site
- Where you’re located
Sandboxed Previews
Tools that render user-provided HTML (HTML Preview, Markdown Preview) use sandboxed iframes:- DOMPurify sanitization - Strips dangerous HTML/JavaScript
- iframe sandbox - Isolates rendering context
- Blob URLs - Content is never assigned a real origin
Cryptographic Operations
Cryptographic tools use battle-tested libraries:- Hashing:
crypto-js(MD5, SHA-1, SHA-256, SHA-512, HMAC) - Random generation:
crypto.getRandomValues()(Web Crypto API) - JWT decoding:
jwt-decode(decode-only, no signature verification) - UUID/ULID:
uuid,ulidx(standardized implementations)
The Hash Generator and JWT Debugger do not perform cryptographic verification. They are for inspection and development purposes only.
Threat Model
What Kayston’s Forge Protects Against
Data exfiltration - No code in the app transmits your data externally
Server-side logging - Static architecture means no server can log requests
Third-party tracking - No analytics, ads, or tracking pixels
Man-in-the-middle attacks - HSTS forces HTTPS with certificate pinning
What Kayston’s Forge Does NOT Protect Against
Security Auditing
Kayston’s Forge uses automated security scanning:GitHub Actions Security Workflow
CodeQL SAST (.github/workflows/security.yml)
- Semantic code analysis for JavaScript/TypeScript
- Detects SQL injection, XSS, path traversal, and other vulnerabilities
- Runs on every push and pull request
- Scans dependencies for known vulnerabilities
- CI fails on CRITICAL severity issues
- HIGH severity issues are reviewed (some may not apply to static export)
- Detects accidentally committed API keys, tokens, and credentials
- Scans entire git history
- Prevents sensitive data from entering version control
- Dependabot configured for weekly updates
- GitHub Actions versions auto-updated
- Security patches applied within 7 days of disclosure
SBOM (Software Bill of Materials)
Every release includes a CycloneDX SBOM listing all dependencies (.github/workflows/sbom.yml).
Vulnerability Disclosure
Kayston’s Forge follows responsible disclosure practices: Security Policy:public/.well-known/security.txt (RFC 9116)
docs/INCIDENT_RESPONSE.md
If you discover a security vulnerability:
- Email
[email protected]with details - Do not publicly disclose until patch is released
- You will receive acknowledgment within 48 hours
- Critical issues are patched within 7 days
Known Accepted Risks
script-src 'unsafe-inline' in CSP
Why it exists:
Next.js 14 with output: 'export' inlines a small hydration bootstrap script that cannot be hashed or nonced without a custom server runtime.
Mitigation:
- React’s default output escaping prevents XSS in
{expression}interpolations - DOMPurify sanitizes all HTML rendered via
dangerouslySetInnerHTML - Preview panes use sandboxed iframes with Blob URLs
Comparison to SaaS Alternatives
| Feature | Kayston’s Forge | Typical SaaS Tool |
|---|---|---|
| Data transmission | None | Sent to server |
| Server-side logging | Impossible (no server) | Common |
| Third-party analytics | None | Google Analytics, etc. |
| Data retention | Local only | 30-90 days typical |
| GDPR compliance | N/A (no data collected) | Requires privacy policy |
| Offline functionality | Full (PWA) | None or limited |
| Trust requirements | Trust your browser | Trust provider, server, cloud |
With Kayston’s Forge, you don’t need to trust us with your data — because we never have access to it.
Security Best Practices for Users
Use HTTPS Always access Kayston’s Forge viahttps:// (HSTS enforces this after first visit).
Keep Browser Updated
Client-side security relies on your browser’s JavaScript sandbox. Use the latest version of Chrome, Firefox, Safari, or Edge.
Review Browser Extensions
Browser extensions can read all page content. Disable unnecessary extensions when processing sensitive data.
Clear History for Sensitive Data
If you process confidential data, clear browser history and IndexedDB after use:
- History is per-tool and limited to 50 entries
- Settings > Clear All History
Open Source Transparency
Kayston’s Forge source code is available for audit:- Repository: github.com/yourusername/kaystonsforge
- License: MIT
- Dependencies: Listed in
package.jsonwith exact versions
You can clone the repository, audit the code, and build your own version from source if you require additional assurance.
Compliance
GDPR - Not applicable (no personal data collected) CCPA - Not applicable (no personal data sold) HIPAA - Not covered (no backend, but client-side use does not create a HIPAA relationship) SOC 2 - Not applicable (no service provider, no data custody)Summary
Zero Data Transmission
All 51 tools process data locally in your browser. No input or output is sent to external servers.
No Analytics or Tracking
No cookies, no analytics, no session replay, no fingerprinting. We cannot see what you do.
Static Architecture
Fully static Next.js export means no server can log, inspect, or intercept your data.
Battle-Tested Security
Strict CSP, HSTS, automated SAST, secret scanning, and dependency audits on every commit.