Skip to main content


Learn more about Apify's security practices and data protection measures that are used to protect your Actors, their data, and the Apify platform in general.

Security Whitepaper

At Apify, security is the top priority of our daily work. Security best practices are reflected in our development, deployment, monitoring, and project management processes. Read the Apify Security Whitepaper for a full description of Apify's measures and commitments to security:

Reporting a vulnerability

If you notice or suspect a potential security breach, please report this immediately to our security team at, including all the technical details.

The total compensation for your report will be highly dependent on the severity, complexity, and exploitability of the vulnerability. Your reports are always verified by our internal security team, which also weighs in on various risks associated with that vulnerability and how major of an impact it would have in case we were attacked.

We strive to reply to all reports within 5 working days. However, depending on the complexity of the issue or our current workload, our response might take longer.

Securing your data

The Apify platform provides you with multiple ways to secure your data. This includes encrypted environment variables to store your configuration secrets and encrypted input to secure the input parameters of your Actors.