React Data GridSecurity

Learn about the security measures we take to make sure you can safely implement Handsontable in your client-side application.


At Handsontable, we take security very seriously. We integrate with Security Tools and Policies to provide a secure data grid. This document provides information on our Security Certification, Audits, and Policies.

Secure data transportation

Handsontable's software is browser-based, and does not communicate with a server. We do not offer or provide recommendations for application-specific back-end solutions.

You need to ensure that the data transportation method that you use, both at the back-end and the front-end, is secure.

Content Security Policy (CSP)

Content Security Policy (CSP) is an added layer of security, used by app vendors to detect and diminish certain types of attacks, such as cross-site scripting (XSS) or data theft.

Handsontable doesn't use external fonts, images or scripts.

If you use CSP in your app, the only rules that you might need to add for Handsontable to run are script-src and style-src:

  • script-src loads Handsontable's script file. Point it at the origin (domain) where you placed your Handsontable assets.
  • style-src ... 'unsafe-inline' loads Handsontable's stylesheet file. Point it at the origin (domain) where you placed your Handsontable assets. Handsontable's XSS prevention logic (DOMPurify) needs the 'unsafe-inline' source expression for certain features (for example, copy and paste).

An example CSP rule for Handsontable hosted on the same app's origin:

<meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self'; style-src 'self' 'unsafe-inline'">

An example CSP rule for Handsontable hosted on a CDN (

<meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self'; style-src 'self' 'unsafe-inline'">

Third-party software

We use dependencies in the form of third-party software, and we take a responsibility to keep them up to date and secure. We also use Fossa (opens new window), third-party software, to stay compliant with third-party license terms.

Content sanitizing

We use dompurify (opens new window) to sanitize the content put into the data grid. But we strongly recommend additional server-side validation to protect your data.

High-quality code pledge

We pledge to deliver high-quality code. You can see our high-quality code score here (opens new window).

Our policy is to fix issues when they arise, as quickly as possible, and keep the library up to date. This requires from you, a user of this software, to keep your copy of Handsontable's software up to date.

Security certificates

We regularly order security audits of the entire Handsontable codebase, carried out by independent cybersecurity experts.

The latest security audits:

Handsontable version Company Concluded on Certificate
8.2.0 Securitum Nov 30, 2020 Download (opens new window)
11.1.0 Seqred Feb 21, 2022 Download (opens new window)
12.3.3 TestArmy Apr 28, 2023 Download (opens new window)
14.3.0 TestArmy Apr 19, 2024 Download (opens new window)

The security audits were carried out in accordance with industry-standard methodologies, including:

  • OWASP Top 10
  • OWASP Application Security Verification Standard (ASVS)

For detailed security reports, contact our Technical Support Team (opens new window).

Code auditing

We use Snyk (opens new window) to audit our code. Snyk integrates seamlessly into our development workflows, checking for vulnerabilities in our source code and in any dependencies, including open-source dependencies.

Snyk provides security status notifications via email or Slack, to:

  • Monitor handsontable/handsontable:package.json in less than a minute
  • Find vulnerabilities using Snyk’s market-leading database


We are insured by Lloyds of London. Our policy protects Handsontable and our customers:

Our Customers Handsoncode (Us)
Cyber media liability Loss or damage to the insured's data or networks
Privacy liability and loss of documents Business interruption
Breach of confidentiality liability Cyber theft
Cyber security liability Cyber extortion
Mitigation costs Telephone hacking of the insured's telephone lines
Regulatory actions and fines Notification expenses
Damage to insured's reputation Damage of the insured's reputation

Code escrow

This service is available for an additional fee. Ask our Sales Team (opens new window) about the pricing.

Code Escrow ensures that software is maintained, protected, and not abandoned.

We host our code on GitHub, a trusted, safe platform hosted by Microsoft. In the unlikely event that something happened to our code on GitHub, a copy of our code is still protected and managed by Codekeeper (opens new window), a source-code escrow company.

We deposit all of our code releases automatically into CodeKeeper. In the case of a release event, Codekeeper provides quick recovery 24/7/365.

Report a security breach

Security of our software and its application in our customers' system is our top priority. Please report any suspicious activity or evidence to, and we will respond promptly.

Bug bounty

We don't offer a bug bounty program, but we sincerely appreciate the work done by security researchers and independent developers.