Skip to content

Security Overview

Trackarr is built with security as a foundational principle, not an afterthought. This page provides an overview of the security architecture.

Security Layers

LayerProtection
AuthenticationZero-Knowledge proofs, PoW anti-abuse, session encryption, CSRF protection
DatabaseSCRAM-SHA-256 auth, TLS, prepared statements, connection pool limits
RedisPassword auth, command restrictions, memory limits
NetworkRate limiting, auto IP bans, attack pattern detection
PrivacySHA-256 hashed IPs, no raw IP persistence, minimal logging

Rate Limits

Trackarr implements distributed rate limiting to prevent abuse:

EndpointLimitAction on Abuse
Public API100/min100+ req/10s → auto-block
Mutations10/minProgressive penalties
Auth5/5minIP blacklisted after violations
Tracker200/minDistributed sliding window

IP Privacy

User IP addresses are never stored in plaintext. Instead:

  1. IPs are hashed using SHA-256 with a secret salt
  2. Only the hash is stored for rate limiting and abuse detection
  3. Hashes cannot be reversed to obtain the original IP
  4. Logs are minimal and do not contain identifying information

Attack Detection

The system automatically detects and blocks:

  • SQL injection attempts
  • XSS (Cross-Site Scripting) attacks
  • Path traversal attempts
  • Brute force authentication attempts
  • Automated scraping and enumeration

Learn More

Released under the MIT License.