Trust & Security

Your data stays on
your network.

Our commitment to security, privacy, and compliance makes us a trusted partner for enterprises worldwide.

Page last updated: 3 May 2025

Zero security incidents

In the past 4 years

100% local processing

Customer data never leaves your firewall

Trusted by 600+ companies

Across every regulated industry

Local-first. By design.

Karate is a local solution, not a cloud-hosted SaaS offering. When using Karate for test automation, customer data never leaves the customer firewall.

This is one of our biggest differentiators and has been a primary driver for companies migrating from SaaS test automation providers to Karate. Only billing (Stripe) and SSO authentication (WorkOS, Google, Microsoft) are delegated to industry-standard cloud providers — and enterprise customers can opt for offline license activation to avoid even those outbound calls.

01 · Architecture

How Karate works

Runs on user desktops

Karate open source, IDE plugins, Xplorer, and Karate Agent all run locally on the user's machine or inside your infrastructure. Nothing is hosted on our cloud.

No customer data storage

Karate Labs does not store any customer test data, application data, or screenshots. All data stays inside your network at all times.

Offline license activation

Enterprise customers can activate licenses offline — no outbound calls required for validation. Suitable for fully air-gapped environments.

02 · Vulnerability Management

How we find and fix vulnerabilities

Maven Central + Sonatype

Karate is released as a Java package via Maven Central infrastructure. Releases are blocked if critical vulnerabilities are present. We have been successfully releasing to Maven Central since 2017. See all releases →

GitHub Dependabot

Continuously scans the repository for known vulnerabilities and deprecated dependencies. GitHub auto-provides pull requests for most remediations, enabling minute-level response times to CVE disclosures.

Community scanning at 600+ enterprises

Customers use solutions like Snyk to scan their code, tools, artifacts, and Docker containers. When a scan flags an issue with Karate, we are notified quickly — often with a PR attached. Example: Log4J issue→

User-controlled dependency overrides

For cases where users cannot wait for an official release, Karate allows dependency overrides. Enterprise users have successfully mitigated CVEs by declaring newer dependency versions in their own POM files. Example: High CVEs in Karate core →

Plugin marketplace review

Stringent checks by JetBrains and Microsoft when publishing plugins to their respective marketplaces.

Public disclosure

All vulnerabilities affecting the security of our software are disclosed publicly via GitHub Security Advisories and Sonatype.

03 · Security Controls

Internal security program

Control Status Notes
Secure source control (GitHub)YesIndustry standard
Antivirus + file integrity monitoringYesInternal systems
Logging and audit trailsYesInternal systems
Principle of least privilegeYesLicense tier enforces feature access
SAML SSO for enterprise customersYesVia WorkOS. Okta, Azure AD, Ping supported. Offline activation optional.
Customer data storedNoneLocal-first architecture
AI / ML on customer dataNoneNot applicable
Data shared with 4th partiesNoneNot applicable
OWASP web application standardsN/AProducts run on desktop, not as web applications

04 · Third-Party Providers

Who we delegate to, and why

Karate Labs does not store customer application data. Supporting services (billing, identity) are delegated to industry-standard providers, each with their own security program.

Stripe — Billing

Payment processing and subscription management. Stripe security documentation →

WorkOS — SAML SSO

Identity and SAML SSO for enterprise customers. Supports Okta, Azure AD, Ping, and other IdPs. Offline activation available.

Google Cloud — OAuth

OAuth flows for Google Workspace authentication.

Microsoft Azure — OAuth

OAuth flows for Microsoft / Entra ID authentication.

No customer application or test data flows through any of these providers. They handle billing and identity only.

05 · Regulatory Compliance

Compliance status

Because Karate Labs does not collect or store customer application data, most consumer data regulations are either satisfied by default or not applicable. Details below.

Regulation Status Notes
CCPA (California)CompliantSee Privacy Policy
CTA (Colorado)Compliant
NYDFS (New York)Not applicableWe do not collect personal resident data
CTDPA (Connecticut)Not applicableWe do not collect personal resident data
VCDPA (Virginia)Not applicableWe do not collect personal resident data
UCPA (Utah)ExemptSmall business exemption

Karate Labs does not sell any data for direct marketing purposes.

06 · Incident Response & Disclosure

How we handle incidents

Security incidents in the past 4 years

None.

Breach notification

Well-defined internal processes for detection, response, and notification. Because Karate Labs does not store customer application data, the customer-impact surface is minimal.

Customer audit requests

Cybersecurity teams can request access and activity audits. Costs for any such audit are borne by the requesting customer and arranged as part of the enterprise contract.

07 · Business Continuity

Disaster recovery

Two dimensions: our own business continuity, and our role as a software provider.

Karate Labs business continuity

All business data backed up via Microsoft OneDrive. Supporting providers (Stripe, WorkOS, Google, Microsoft Azure) maintain their own DR programs.

Customer DR is customer-controlled

Because Karate runs locally on customer infrastructure, customers follow their own DR and business continuity controls for their Karate deployment. There is no dependency on Karate Labs cloud services.

Software availability is not dependent on Karate Labs uptime. Once activated (including offline activation), Karate operates entirely within your infrastructure.

08 · Updates & Patching

You control when to upgrade

Open source

Update via Maven or Gradle build configuration, or download binary artifacts directly. Release notes on GitHub →

VS Code extension

By default, new versions install automatically. Users or organizations can disable this. Rollback to any previous version is supported at any time.

IntelliJ plugin

Plugins are not installed automatically by default. Users choose which updates to install. Rollback supported at any time.

Both marketplaces have review and approval processes before publication.

09 · Resources & Downloads

Documentation you can share internally

10 · Responsible Disclosure

Report a vulnerability

We welcome responsible disclosure of security vulnerabilities. Two channels:

Email

info@karatelabs.io

Subject line: “Security — [brief summary]”. Include reproduction steps and impact assessment.

GitHub Security Advisories

Submit privately via GitHub →

Preferred for open source framework vulnerabilities. GitHub handles CVE reservation and coordinated disclosure.

We publicly disclose confirmed vulnerabilities after remediation. No bounty program at this time; researchers are credited in the advisory.

Need more for your security review?

We’re happy to share NDA-free documentation, complete your security questionnaire, or join a call with your security team.