At Gorilla, we regard the trust our customers place in us as our most valuable asset. We take this responsibility seriously and are committed to delivering the highest level of security to protect their most sensitive information.
This document outlines Gorilla’s security architecture, the design principles that guide our decisions, and the threat model we address to ensure the security of our platform and operations. Our approach is rooted in transparency first, ensuring that our security practices are open to scrutiny, continuously refined, and aligned with industry best practices.
Gorilla’s security architecture is built on a set of core principles that ensure the highest level of protection for the data we process. These principles guide our design decisions, and we believe that as long as we stay within these guardrails, we are making the right security choices - building a platform that is both resilient and trustworthy.
The following are the primary threats that Gorilla's security architecture is designed to mitigate, reflecting our current architecture and focus at the time of writing—namely, the protection of customer 1Password items and the service account credentials we use for sync operations.
Security is never static, and neither is our threat model. As Gorilla evolves, we will continuously refine and expand our understanding of potential attack vectors, bringing more sophistication and depth into how we assess and mitigate risks.
Attacks Against 1Password Items
Attackers may attempt to gain access to or compromise 1Password-stored secrets (e.g., passwords, documents). While Gorilla does not store these secrets, its sync operations must temporarily handle them for analysis, making this an important consideration for security.
Attacks Against Gorilla Service Account Credentials
The service accounts Gorilla uses to connect to customer 1Password tenants are a critical vulnerability. If these credentials were compromised, an attacker could directly gain access to the 1Password tenants we aim to secure, making this the highest-risk target in the threat model.
Attacks Against the Web Frontend (e.g. XSS)
The web interface Gorilla uses to interact with customers is a potential attack surface for cross-site scripting (XSS) and other frontend attacks that could expose customer data and other meta-data, if not properly secured.
Attacks Against User Authentication
Attempts to compromise Gorilla user authentication through methods like credential stuffing, phishing, or brute force. Protecting the integrity of user logins is critical to securing the platform.
Attacks from the Outside: Vulnerabilities in our Technology Stack
External attackers could attempt to exploit vulnerabilities in Gorilla’s application layer, the underlying infrastructure or third-party services. This includes potential zero-day exploits in the technology stack that could be used to gain unauthorized access.
Attacks from the Inside: Insider Threats
Malicious insiders within Gorilla (e.g., developers, operations staff, or customer support) could theoretically abuse their privileged access to internal systems. These insiders could potentially compromise anything ranging from source code, to service accounts or sensitive infrastructure configuration.
Attacks on Third-Party Services
Gorilla relies on third-party providers for hosting and infrastructure. Compromise of these services (e.g., PaaS providers) could impact the security of the Gorilla platform and customer data.