Your code is your most valuable asset. Here's how we protect it.
Your code is encrypted on your machine before it leaves. We use industry-standard AES-256 encryption with per-user keys. We cannot read your source code.
We store encrypted data only. File contents are not visible to our systems or team. Only you can decrypt your snapshots.
Hosted on secure cloud infrastructure with encryption at rest and in transit. All connections use modern TLS encryption.
API keys for CLI authentication are hashed before storage. Revoke keys instantly from the dashboard if needed.
All file content is encrypted client-side before upload. Encryption keys are derived from your account and never leave your machine in plaintext. Even if our servers were compromised, your code would remain unreadable.
Encrypted snapshots are stored in private cloud storage with server-side encryption. Data is isolated between users at the database level. No public access to storage.
Only you can access your workspaces and snapshots. API keys are hashed and can be revoked at any time. Rate limiting prevents abuse.
All data in transit is encrypted with TLS. API endpoints are protected against common attacks. Webhooks use signature verification.
For security inquiries, vulnerability reports, or enterprise requirements:
Contact Us