keyCocoon Privacy Policy

Last Updated: November 12, 2024

1. INTRODUCTION

keyCocoon ("we," "our," or "the Extension") is a browser extension that acts as a secure bridge between webSlinger automation and your locally-stored credentials in keyBunker. This Privacy Policy explains our zero-knowledge architecture and how we handle your information.

CRITICAL PRIVACY PRINCIPLE:

keyCocoon NEVER stores, transmits, or accesses your credentials. We act solely as a secure communication bridge between webSlinger and keyBunker. All credential data remains encrypted on your local device.

2. INFORMATION WE COLLECT

2.1 Configuration Settings (LOCAL ONLY)

keyCocoon stores ONE setting locally in browser storage:

This preference is stored to improve user experience by pre-populating your preferred duration the next time you authenticate with keyBunker.

That's it. We collect no other data.

2.2 What We DO NOT Collect

keyCocoon does NOT collect, store, or transmit:

3. HOW keyCocoon WORKS (ZERO-KNOWLEDGE ARCHITECTURE)

3.1 Credential Flow

When webSlinger needs to inject credentials:

1. webSlinger Extension
↓ (sends request via extension messaging)
"Please log into example.com for user john@example.com"

2. keyCocoon Extension (THIS EXTENSION)
↓ (forwards request via native messaging)
"Retrieve password for example.com/john@example.com"

3. keyBunker Native App
↓ (decrypts from local vault)
Returns encrypted password to keyCocoon

4. keyCocoon Extension
↓ (injects into target tab)
Fills password field, clears from memory immediately

KEY PRIVACY POINTS:

3.2 TOTP Code Generation

For two-factor authentication codes:

  1. webSlinger requests TOTP code for domain/username
  2. keyCocoon requests code from keyBunker via native messaging
  3. keyBunker generates 6-digit TOTP code using RFC 6238 algorithm
  4. keyCocoon receives code (NOT the secret)
  5. keyCocoon injects code into authentication form
  6. Code cleared from memory immediately

TOTP secrets NEVER leave keyBunker. Only the generated 6-digit codes (which expire in 30 seconds) are transmitted to keyCocoon for injection.

4. DATA STORAGE

4.1 What We Store

keyCocoon stores exactly ONE item in Chrome's local storage API:

This is stored locally in your browser and is NOT:

4.2 What keyBunker Stores (NOT keyCocoon)

keyBunker (the native application) stores:

This data is:

5. DATA SHARING AND THIRD PARTIES

5.1 We Do NOT Share Data

keyCocoon does NOT share any data with:

5.2 Inter-Extension Communication

keyCocoon communicates with:

webSlinger Extension (Optional Integration)

keyBunker Native App (Required)

5.3 No External Services

keyCocoon does NOT communicate with:

ALL communication is local-only between browser extensions and native apps.

6. SECURITY MEASURES

6.1 Credential Encryption in Transit

When keyBunker sends passwords to keyCocoon:

This ensures credentials are encrypted even over the local native messaging channel.

6.2 Memory Management

6.3 No Logging

keyCocoon does NOT log:

Console logging may occur for debugging but NEVER includes sensitive data.

7. BROWSER EXTENSION PERMISSIONS

keyCocoon requests the following permissions:

7.1 activeTab

7.2 scripting

7.3 nativeMessaging

7.4 storage

7.5 tabs

7.6 management

7.7 Content Scripts (<all_urls>)

NOTE: keyCocoon does NOT request host_permissions. Content scripts run on <all_urls> but only activate when explicitly requested by webSlinger for credential injection. This is more privacy-friendly than host_permissions.

8. YOUR PRIVACY RIGHTS

8.1 Data Access

Since keyCocoon stores only one configuration value:

8.2 Data Deletion

To delete all keyCocoon data:

Note: Uninstalling keyCocoon has NO effect on keyBunker data. Your credentials remain safely stored in keyBunker's encrypted vault.

8.3 Credential Control

9. CHILDREN'S PRIVACY

keyCocoon is not intended for use by children under 13 years of age. We do not collect any personal information from users of any age. If a parent believes their child has installed keyCocoon, they may uninstall it without any data loss (credentials remain in keyBunker).

10. INTERNATIONAL CONSIDERATIONS

keyCocoon operates entirely locally on your device:

11. CHANGES TO THIS PRIVACY POLICY

We may update this Privacy Policy to reflect changes in:

When we make changes:

Since keyCocoon collects no data, privacy policy changes typically reflect architectural improvements rather than data handling changes.

12. SECURITY VULNERABILITIES

If you discover a security vulnerability in keyCocoon:

We take security seriously and will respond within 48 hours.

13. CONTACT US

For privacy questions about keyCocoon:

14. COMPARISON WITH OTHER PASSWORD MANAGERS

Unlike cloud-based password managers, keyCocoon:

✓ Better Privacy:

✗ Trade-offs:

keyCocoon prioritizes PRIVACY and SECURITY over CONVENIENCE.

15. FREQUENTLY ASKED QUESTIONS

Q: Does keyCocoon send my passwords to webSlinger?

A: NO. Credentials are injected directly into web pages. webSlinger only receives success/failure status, never the actual credentials.

Q: Can keyCocoon access my credentials without my permission?

A: NO. keyBunker requires master password authentication. Without authenticating keyBunker, keyCocoon cannot retrieve credentials.

Q: What happens if I uninstall keyCocoon?

A: Your credentials remain safe in keyBunker's encrypted vault. keyCocoon is just a bridge; uninstalling it has no effect on stored credentials.

Q: Does keyCocoon work without webSlinger?

A: Not currently. keyCocoon is designed specifically as a credential bridge for webSlinger automation. Standalone credential injection features may be added in future versions.

Q: How is this different from LastPass or 1Password?

A: keyCocoon doesn't store credentials itself (keyBunker does, locally). No cloud sync, no subscription, no trust in third-party servers. Pure local storage with zero-knowledge architecture.

Q: Can keyCocoon be audited?

A: Yes. Security researchers can request source code review. We plan to open-source keyCocoon after initial release to enable community audits.