Streamlit

Security scanning for Streamlit apps

Streamlit accelerates data app development for ML engineers — but the typical Streamlit deployment is on a public URL with no auth. If your app handles real data, run a scan to confirm the basic perimeter (headers, TLS, secrets) is in place.

Most common issues

  1. 01st.secrets file accessible via the deployed URL if misrouted
  2. 02Streamlit Cloud apps with no authentication, exposing data widgets to anyone
  3. 03Missing CSP/HSTS on custom-deployed Streamlit (Render, Cloud Run)

What SafeToShip checks for Streamlit

  • exposed-files
  • js-secrets
  • headers
  • ssl
  • tech-detect

FAQ

Frequently asked questions

How do I add auth to a Streamlit app?
Streamlit Community Cloud has built-in Google sign-in via "Settings → Sharing → Viewer access". For custom deploys, wrap with an OAuth proxy (Pomerium, Cloudflare Access) or use streamlit-authenticator.
Is st.secrets safe?
Yes when used on the server side only. The secrets.toml file should never be at a publicly-served path — confirm with a SafeToShip scan.

Run a Streamlit security scan

Free. 70+ checks. 60 seconds.