Skip to content
Login

Trust & Security

HLE is a relay service — your traffic passes through the HLE server to provide SSO authentication and subdomain routing. Transparency matters — here’s what that means for your data.

Architecture

Your Service ←→ HLE Client ←→ [TLS] ←→ HLE Relay ←→ [TLS] ←→ End User
(your network) (HLE server) (browser)

The HLE relay terminates TLS to read HTTP headers for authentication and subdomain routing. This is a standard reverse-proxy architecture — the same approach used by Cloudflare Tunnel, Ngrok, and similar services. Because TLS is terminated at the relay, request data (headers, bodies, URLs) passes through server memory during proxying.

What HLE Logs

HLE logs security events, not traffic content. Every login, tunnel connection, access gate decision, and billing event is recorded with timestamps and IP addresses.

What’s loggedDetails captured
Account eventsLogin, registration, password changes, SSO linking — with IP and timestamp
Tunnel eventsConnected, disconnected, access rule changes, PIN/auth config changes
Access gatePer-visitor decisions: IP, user agent, auth method used, allowed/denied
Traffic metricsByte counts, request counts, latency — never URLs, headers, or bodies

What HLE never stores

The relay proxies your traffic content in memory only — nothing below is ever written to disk:

  • Request/response bodies
  • URL paths — the relay routes by subdomain; full paths are forwarded to your service but never logged
  • Application headers and cookies — auth tokens, custom headers, and session cookies pass through memory but are never persisted
  • File contents, form data, or API payloads
  • WebSocket message contents

Encryption

  • Client to relay: TLS 1.2+ (WebSocket over HTTPS)
  • Relay to end user: TLS 1.2+ with Let’s Encrypt certificates
  • Passwords: PBKDF2-SHA256 with 600,000 iterations (OWASP recommendation)
  • API keys: Stored as SHA-256 hashes (plaintext never persisted)
  • JWTs: HS256 signed, HTTP-only SameSite=Lax cookies, 24h expiry

Rate Limiting & Abuse Prevention

  • Login: 10 attempts per IP per 5 minutes
  • Registration: 3 attempts per IP per 5 minutes
  • Account lockout: Progressive backoff after 5 failed logins (60s, doubling up to 1 hour)
  • reCAPTCHA v3 on registration (when configured)

Tunnel Access Control

Every tunnel is protected by default. The owner controls who can access it:

MethodDescriptionPlans
SSO allow-listEmail + provider rules (Google, GitHub, any)All
PIN4-8 digit numeric codeAll
HTTP Basic AuthUsername/password enforced at relayAll
Share linksTemporary signed URLs with expiryFree: 1h/1 active, Pro: 24h/10, Business: 7d/unlimited
Public modeNo authentication (--auth none)All

Audit Logging & Data Retention

Administrative actions (user management, API key operations, setting changes, access rule modifications) are logged separately with timestamps, user identity, and action details.

Data retention by plan

DataFreeProBusiness
Access log retention7 days30 days90 days
Export logs (CSV)YesYes
Disable access loggingYesYes
IP allowlist per tunnelYes

Open Source

The HLE client is fully open source under the MIT license:

Security Scanning

Per-commit (every push and PR)

  • Semgrep — Static application security testing (SAST)
  • Bandit — Python-specific security linting
  • pip-audit — Python dependency vulnerability scanning
  • npm audit — Frontend dependency scanning
  • TruffleHog — Secret detection in commits
  • Gitleaks — Git history secret scanning

Periodic (nightly and on-demand)

  • OWASP ZAP — Dynamic application security testing (DAST)
  • Nuclei — Network vulnerability scanning
  • Trivy — Container image vulnerability scanning
  • TestSSL/SSLyze — TLS configuration testing

GDPR & Privacy

HLE processes IP addresses under GDPR Article 6(1)(f) — legitimate interest for security and abuse prevention. See the full Privacy Policy for details.

You have the right to:

  • Access your data (visible in your dashboard)
  • Delete your account and all associated data (contact hello@hle.world)
  • Export your access logs (Pro and Business plans, CSV from dashboard)
  • Object to processing (contact hello@hle.world)

Responsible Disclosure

Found a security vulnerability? Please report it responsibly:

  • Email: hello@hle.world
  • Do not open public GitHub issues for security vulnerabilities
  • HLE aims to acknowledge reports within 48 hours
  • HLE will not take legal action against good-faith security researchers