Mac OS has a quite elegant keychain for storing secrets, which are tightly bound to app packages and/or developers (via their app signing key).
Recently, there have been some high profile compromises of logged-in sessions in browsers via on-device malware (usually affecting Windows users), which steals browser "cookie jars" to get logged-in session tokens, and send these remotely for use by the attacker.
Mac OS can, out the box, resist this attack fairly effectively - Chrome already stores a credential in the user keychain (Ref), tied to the Chrome browser app so other apps cannot use it. This means if malware gets access to the user's filesystem, they cannot steal their cookie jar in usable form.
Orion currently doesn't implement any kind of protection like this for the most readily stolen sensitive session data (cookies). It would be worth looking at getting to Chrome's level of protection, and encrypting this data via a random passphrase that's stored in the keychain.