๐Ÿ“… let's chat! explore the endless possibilities creating industries that don't exist. click here

lokalise-security-basics

Apply Lokalise security best practices for API tokens and access control. Use when securing API tokens, implementing least privilege access, or auditing Lokalise security configuration. Trigger with phrases like "lokalise security", "lokalise secrets", "secure lokalise", "lokalise API token security". allowed-tools: Read, Write, Grep version: 1.0.0 license: MIT author: Jeremy Longshore <jeremy@intentsolutions.io>

Allowed Tools

No tools specified

Provided by Plugin

lokalise-pack

Claude Code skill pack for Lokalise (24 skills)

saas packs v1.0.0
View Plugin

Installation

This skill is included in the lokalise-pack plugin:

/plugin install lokalise-pack@claude-code-plugins-plus

Click to copy

Instructions

# Lokalise Security Basics ## Overview Security best practices for Lokalise API tokens, webhook secrets, and access control. ## Prerequisites - Lokalise SDK installed - Understanding of environment variables - Access to Lokalise profile settings ## Instructions ### Step 1: Configure Environment Variables ```bash # .env (NEVER commit to git) LOKALISE_API_TOKEN=abc123... LOKALISE_WEBHOOK_SECRET=whsec_*** LOKALISE_PROJECT_ID=123456789.abcdef # .gitignore (MUST include) .env .env.local .env.*.local *.env ``` ### Step 2: Token Types and Permissions | Token Type | Use Case | Permissions | |------------|----------|-------------| | Read-only | CI builds, reporting | Read projects, keys, translations | | Read-write | Full integration | All CRUD operations | | OAuth2 | User-facing apps | Scoped per user consent | ```typescript // Use appropriate token type const readOnlyClient = new LokaliseApi({ apiKey: process.env.LOKALISE_READ_TOKEN!, }); const fullAccessClient = new LokaliseApi({ apiKey: process.env.LOKALISE_WRITE_TOKEN!, }); ``` ### Step 3: Implement Token Rotation ```bash # Token rotation procedure: # 1. Generate new token in Profile Settings -> API tokens # 2. Update environment variable in all environments # 3. Test new token # 4. Revoke old token # Verify new token works curl -X GET "https://api.lokalise.com/api2/projects" \ -H "X-Api-Token: $LOKALISE_API_TOKEN_NEW" \ | jq '.projects | length' # If successful, update and revoke old token export LOKALISE_API_TOKEN="$LOKALISE_API_TOKEN_NEW" ``` ### Step 4: Webhook Secret Verification ```typescript import crypto from "crypto"; function verifyWebhookSignature( payload: string, receivedSecret: string, expectedSecret: string ): boolean { // Lokalise sends secret in X-Secret header return crypto.timingSafeEqual( Buffer.from(receivedSecret), Buffer.from(expectedSecret) ); } // Express middleware app.post("/webhooks/lokalise", (req, res) => { const receivedSecret = req.headers["x-secret"] as string; const expectedSecret = process.env.LOKALISE_WEBHOOK_SECRET!; if (!verifyWebhookSignature(req.body, receivedSecret, expectedSecret)) { console.error("Invalid webhook signature"); return res.status(401).json({ error: "Invalid signature" }); } // Process webhook handleWebhook(req.body); res.status(200).json({ received: true }); }); ``` ### Step 5: Apply Least Privilege ```typescript // Project-level access control // Use Team settings to limit user access to specific projects // Environment-specific tokens const tokenConfig = { development: { token: process.env.LOKALISE_DEV_TOKEN, projectId: process.env.LOKALISE_DEV_PROJECT, }, staging: { token: process.env.LOKALISE_STAGING_TOKEN, projectId: process.env.LOKALISE_STAGING_PROJECT, }, production: { token: process.env.LOKALISE_PROD_TOKEN, projectId: process.env.LOKALISE_PROD_PROJECT, }, }; function getLokaliseConfig() { const env = process.env.NODE_ENV || "development"; return tokenConfig[env as keyof typeof tokenConfig]; } ``` ## Output - Secure API token storage - Environment-specific access controls - Webhook signature verification - Token rotation procedure documented ## Error Handling | Security Issue | Detection | Mitigation | |----------------|-----------|------------| | Exposed API token | Git scanning, logs | Rotate immediately | | Missing .gitignore | Code review | Add .env to ignore | | Webhook without verification | Security audit | Add signature check | | Single token for all envs | Config review | Separate per environment | ## Examples ### Service Account Pattern ```typescript // Use different clients for different operations const clients = { reader: new LokaliseApi({ apiKey: process.env.LOKALISE_READ_TOKEN!, }), writer: new LokaliseApi({ apiKey: process.env.LOKALISE_WRITE_TOKEN!, }), }; // Read operations use read-only token async function getTranslations(projectId: string) { return clients.reader.translations().list({ project_id: projectId }); } // Write operations use write token async function updateTranslation(projectId: string, translationId: number, text: string) { return clients.writer.translations().update(translationId, { project_id: projectId, translation: text, }); } ``` ### Secret Scanning Prevention ```typescript // Pre-commit hook to prevent token leaks // .husky/pre-commit const dangerousPatterns = [ /LOKALISE_API_TOKEN\s*=\s*["']?[a-zA-Z0-9]{40,}/, /X-Api-Token:\s*[a-zA-Z0-9]{40,}/, ]; function scanForSecrets(content: string): boolean { return dangerousPatterns.some(pattern => pattern.test(content)); } ``` ### Audit Logging ```typescript interface AuditEntry { timestamp: Date; action: string; userId?: string; projectId: string; resource: string; result: "success" | "failure"; metadata?: Record; } async function auditLog(entry: Omit): Promise { const log: AuditEntry = { ...entry, timestamp: new Date() }; // Log locally for compliance console.log("[AUDIT]", JSON.stringify(log)); // Optional: Send to logging service await sendToLoggingService(log); } // Usage await auditLog({ action: "lokalise.keys.create", projectId: "123456.abc", resource: "/keys", result: "success", metadata: { keyCount: 5 }, }); ``` ### Security Checklist ```markdown ## Lokalise Security Checklist ### Token Management - [ ] API tokens stored in environment variables - [ ] .env files in .gitignore - [ ] Different tokens for dev/staging/prod - [ ] Read-only tokens where possible - [ ] Token rotation schedule (quarterly) ### Webhook Security - [ ] HTTPS-only webhook endpoints - [ ] X-Secret header validated - [ ] Timing-safe comparison for secrets ### Access Control - [ ] Minimal team member permissions - [ ] Project-level access restrictions - [ ] Regular access audits ### Monitoring - [ ] Audit logging enabled - [ ] Failed auth attempts monitored - [ ] Unusual API usage alerts ``` ### CI/CD Secret Management ```yaml # GitHub Actions jobs: deploy: steps: - name: Download translations env: LOKALISE_API_TOKEN: ${{ secrets.LOKALISE_API_TOKEN }} run: npm run i18n:pull # GitLab CI deploy: variables: LOKALISE_API_TOKEN: $LOKALISE_API_TOKEN # From CI/CD settings script: - npm run i18n:pull ``` ## Resources - [Lokalise API Authentication](https://developers.lokalise.com/reference/api-authentication) - [Lokalise Team Management](https://docs.lokalise.com/en/articles/1400472-team-management) - [OAuth2 Guide](https://developers.lokalise.com/reference/oauth2-authentication) ## Next Steps For production deployment, see `lokalise-prod-checklist`.

Skill file: plugins/saas-packs/lokalise-pack/skills/lokalise-security-basics/SKILL.md