Security & Privacy
We're a security product. Our trust matters more than our marketing copy. Here's exactly what happens to your code, where it goes, and how we protect it.
What we store about your code
Where your code goes
npx bryxe scan)100% local. Nothing leaves your machine. The most paranoid option.
Code processed in memory on our servers (Vercel, US East). Findings persisted to Postgres (Supabase, US East). No third parties involved.
Up to 8 files × 12 KB each (≈ 96 KB total) sent to Anthropic API for the AI audit pass. Anthropic does not train on API traffic. Default 30-day retention on their side (Enterprise customers can request zero-retention).
We fetch() your public URL — same thing any browser does. No private code involved. We block SSRF to AWS metadata IPs, RFC1918, link-local, etc.
How we protect ourselves (so we protect you)
- ✓ TLS everywhere (HSTS preload-eligible, 2-year max-age, includeSubDomains)
- ✓ Strict CSP with no
unsafe-eval,object-src 'none',frame-ancestors 'none' - ✓ Cross-Origin-Opener-Policy: same-origin + COR-Policy: same-origin (XS-Leaks defence)
- ✓ Account lockout after 5 failed logins in 15 minutes (per email + per IP)
- ✓ Sessions revoked on every password change (force re-login on all devices)
- ✓ AES-256-GCM at rest for GitHub OAuth tokens; bcrypt 12 for passwords
- ✓ Stripe + GitHub webhook signature verification (constant-time HMAC compare)
- ✓ Per-route rate limiting (token bucket in DB)
- ✓ CSRF protection via Origin header check + SameSite=Lax cookies
- ✓ ZIP-bomb protection (capped extracted bytes, file count, single-file size)
- ✓ Path-traversal rejection on every archive entry
- ✓ SSRF defence on URL scanner (DNS-resolved blocklist; no
file://) - ✓ Production source maps disabled,
X-Powered-Bystripped - ✓ Audit log on every auth event, GitHub-integration change, account deletion
- ✓ GDPR data export + right-to-erasure at /app/profile
Report a vulnerability
Found a bug? Email security@bryxe.app. Acknowledgement within 24 hours, fix SLA per severity in our SECURITY.md.
Safe-harbour applies if you follow responsible disclosure (no DoS, no data exfiltration beyond PoC, give us time to fix).
What's next
- 📋 SOC 2 Type I audit — Q3 2026
- 🔐 Customer-managed encryption keys (BYOK) — for enterprise
- 🌐 EU region (data residency) — Q4 2026
- 🐳 Self-hosted Docker image — for the most paranoid customers