FieldPulse Salesforce Field Health
Security & Trust Overview

Your data never
leaves your browser.

A transparent look at how FieldPulse handles your Salesforce data — our architecture, permissions, and the promises we make to the people who install us.

No external servers
All processing happens locally in Chrome.
No telemetry
Zero analytics, tracking, or usage collection.
No credential storage
Uses your existing Salesforce session only.
Read-only analytics
Cannot modify records, fields, or metadata.

What's in this document

A plain-language walkthrough of how FieldPulse works under the hood, what it can and cannot access, and why you can trust it on your Salesforce org.

  1. 01Executive Summary — our four trust pledges03
  2. 02Data Flow — where your data actually goes04
  3. 03Trust Boundary — what lives where05
  4. 04Authentication — how we log in without your password06
  5. 05Permission Justification — every permission, explained07
  6. 06Data Storage & Retention08
  7. 07What We Never Do09
  8. 08Verify It Yourself10
  9. 09Reporting & Contact11
The one-sentence version

FieldPulse reads field metadata from your active Salesforce session, computes health analytics entirely inside your browser, and never sends anything to any server we control — because we don't have any.

Our four trust pledges

These are not marketing claims — they are architectural facts. The rest of this document shows you exactly how each pledge is enforced in code.

01

Zero external servers

FieldPulse has no backend. There is no FieldPulse cloud, API, or database. Every calculation runs inside your Chrome browser on your machine.

02

Zero telemetry

No analytics SDK, no event tracking, no error reporting services. We don't know when you use the extension, what records you view, or what fields exist in your org.

03

No credential storage

FieldPulse never asks for, sees, or stores your Salesforce username or password. It uses the session cookie your browser already has.

04

Read-only by design

FieldPulse performs only SELECT and COUNT queries against the Salesforce REST API. It is architecturally incapable of modifying records, fields, or metadata.

Who this document is for

If you are a Salesforce admin, consultant, or data architect evaluating whether FieldPulse is safe to install on a production org — this document exists for you. Everything here is independently verifiable: the extension source code is readable, the permissions are declared in the manifest, and network traffic can be inspected in DevTools.

A quick mental model

Think of FieldPulse as a calculator that lives inside your Chrome extension tray. It borrows your open Salesforce session, reads field data, does math, and shows you the result. Nothing leaves the calculator.

Where your data actually goes

Every byte of Salesforce data touched by FieldPulse follows this exact path. Notice what's missing: a FieldPulse server.

YOUR BROWSER Salesforce Page (Lightning record view) Content Script (renders overlays) Service Worker analyzer + cache (all math here) Local Cache session + IndexedDB YOUR SALESFORCE ORG Salesforce REST API UI API + SOQL queries record ID SELECT / COUNT field data — no third-party server exists in this diagram —
Figure 1 — The complete data path. Traffic flows only between your browser and your Salesforce org.

What the diagram tells you

What lives where

A trust boundary shows which components can see which data. FieldPulse has only two boundaries: your device and your Salesforce org. Nothing else.

TRUST ZONE 1 · YOUR DEVICE CHROME FieldPulse Extension service worker + content script + panel Session Storage (tab-scoped) IndexedDB (cached field metadata) Local Storage (preferences only) All above: cleared by "Clear Cache" button HTTPS TRUST ZONE 2 · YOUR SALESFORCE Salesforce REST API v62.0 / UI API / SOQL Your Org's Records access via your user's perms Session Cookie issued by Salesforce at login All above: governed by Salesforce's own security
Figure 2 — Only two trust zones exist. FieldPulse does not operate a third zone.

Why this matters

Most extensions introduce a third trust zone — "the vendor's cloud" — where your data is processed, logged, or stored. FieldPulse deliberately has none. If our company disappeared tomorrow, no FieldPulse-hosted data would be at risk, because no such data exists.

How we log in without your password

FieldPulse never asks for your Salesforce credentials. It borrows the session you already established when you logged in to Salesforce in your browser.

1 You log into Salesforce (as you normally do) 2 Salesforce sets a session cookie (stored in Chrome) 3 FieldPulse reads the cookie (scoped) only from SF domains 4 Sends API call with Bearer token direct to your org Credentials never touch FieldPulse We do not see your username, password, MFA code, or SSO credentials. The session cookie is the only auth artifact we use, and it is only read at query time — never persisted to disk by the extension.
Figure 3 — The four-step authentication path. No credentials pass through FieldPulse.

What this means in practice

Every permission, explained

Chrome extensions declare their permissions upfront in manifest.json. Here is each one FieldPulse requests, exactly why, and what it does not let us do.

Permission Why FieldPulse needs it What it does NOT allow
activeTab Detect when you're on a Salesforce record page and inject the overlay only into that tab. Cannot access other tabs, history, or bookmarks.
storage Save your preferences (overlay on/off, tooltip toggle) and cache field analytics locally. Cannot sync to any cloud. Storage stays on this device.
sidePanel Render the analytics dashboard in Chrome's native side panel. Cannot open panels outside FieldPulse's own UI.
scripting Inject the overlay script into Salesforce pages when you navigate to a record. Cannot inject into non-Salesforce sites — host permissions restrict it.
alarms Run a background timer to refresh stale cache entries every 30 minutes. Cannot schedule network calls outside Salesforce. Only triggers internal cache refresh.
cookies Read the Salesforce sid session cookie to authenticate REST API calls. Scoped to Salesforce domains only. Cannot read cookies from Gmail, banking, or any other site.

Host permissions — where we can run

The extension can only execute on these four domain patterns, declared in manifest.json:

https://*.my.salesforce.com/*
https://*.lightning.force.com/*
https://*.force.com/*
https://*.salesforce.com/*

Outside these domains, FieldPulse is dormant. It cannot read, modify, or observe anything on any other website.

Content Security Policy

The extension enforces script-src 'self'; object-src 'self' — meaning only scripts bundled inside the extension package can run. No inline scripts, no remote CDNs, no eval(). This prevents injected or tampered code from executing.

What's cached, where, and for how long

FieldPulse caches analytics locally to make repeat visits instant. All cache lives on your device. You can clear it at any time from the extension settings.

Storage Layer What it contains Retention Location
Session Storage Most recent analytics result for the current browsing session Until tab closes Chrome session memory
IndexedDB Field metadata, fill rates, edit-frequency counts 1 hour – 7 days (by type) Chrome profile folder, on this device
Local Storage Your preferences (fp_settings) and recent records list (fp_recent) Until you uninstall or clear Chrome profile folder, on this device

Cache TTLs by data type

Data type Time-to-live Why this duration
Field metadata7 daysSchema changes infrequently
Fill rates1 dayDaily refresh covers typical org activity
Edit frequency1 hourRecent edit counts need to be current
Record counts6 hoursTotals change slowly
You own the data

Uninstalling FieldPulse from Chrome deletes all three storage layers. The "Clear Cache" button inside the extension performs the same wipe on demand. We have no way to recover the data because we never had a copy.

What is not stored

The negative-space promise

Sometimes the strongest trust signal is a clear list of things an extension cannot and will not do — backed by architecture, not just policy.

Don't take our word — check

Every claim in this document is independently verifiable. Here is how to audit FieldPulse in about ten minutes.

1. Inspect declared permissions

Chrome shows every permission the extension requests before you install it. Post-install, go to chrome://extensions, find FieldPulse, click "Details", and review "Permissions" and "Site access". The full set should match the table on page 07.

2. Read the manifest

Open chrome://extensions, enable "Developer mode", then click "Inspect views: service worker". In the Sources panel, open manifest.json. The permissions, host_permissions, and content_security_policy blocks are the source of truth.

3. Watch the network

Open Chrome DevTools → Network tab while using FieldPulse on a record page. Filter by "Fetch/XHR". Every request's "Domain" column should show only your Salesforce domains. If you ever see a request going anywhere else, that is a bug — report it.

What a clean audit looks like

You will see requests to yourorg.my.salesforce.com/services/data/v62.0/... and nothing else. No analytics beacons, no third-party CDNs, no error-reporting endpoints.

4. Read the source

Chrome extensions ship as unminified JavaScript. On Windows, the extension folder lives under %LOCALAPPDATA%\Google\Chrome\User Data\Default\Extensions\. You can open every file in a text editor — there are no bundlers, no transpilers, no hidden build steps. What you see is what runs.

5. Review the privacy policy

The full privacy policy is published at forcenaut.com/fieldpulse/privacy-policy.html and bundled with the extension. It echoes the promises in this document in formal legal language.

Total transparency by design

We chose not to minify, bundle, or obfuscate the extension. The entire codebase is approximately 2,300 lines of plain JavaScript — readable in an afternoon by a developer comfortable with vanilla JS.

Reporting a security concern

If you discover a vulnerability, privacy issue, or behavior that contradicts anything in this document, we want to hear about it first — before anyone else does.

Responsible disclosure

Please email us directly rather than filing a public issue. We aim to acknowledge reports within 2 business days and issue a fix (or a mitigation plan) within 14 days for valid security issues.

@

Security contact

Email: srbagal.ceo@gmail.com
Subject line: "FieldPulse Security"

#

What to include

Extension version, Chrome version, steps to reproduce, and — if relevant — a screenshot of DevTools showing the unexpected behavior.

What counts as a security issue

Thank you

Trust is earned by operating transparently for a long time. If you've read this far, thank you for caring about the data your team handles — that's exactly the mindset FieldPulse was built for.

FieldPulse · Forcenaut
Salesforce Field Health, entirely in your browser.
Document v1.0 · April 2026
© 2026 Shrikant Bagal