Security & Privacy

Understand how Kodezi OS safeguards your code, data, workflows, and development process.

Security is fundamental to Kodezi OS. Because it interacts deeply with your repositories, issue trackers, and CI/CD workflows, it uses strict security standards to protect your codebase and organizational data.

Data Protection

Code Security

Kodezi OS follows enterprise grade protection:

  • End-to-end encryption for all code transfers
  • No permanent storage of source code
  • SOC 2 compliant infrastructure
  • Regular penetration tests and audits

Kodezi processes code temporarily only to generate fixes or insights.

Access Control

Security Controls

  • Role based access permissions
  • OAuth based authentication
  • Restrictive repository access
  • Full audit logging of automated changes

Every healing action, PR creation, or refactor is fully traceable.

Privacy Policy

What Kodezi OS Accesses

Used only during active operations:

  • Code structure and patterns
  • Error logs and stack traces
  • Commit and PR history
  • Issue tracking data

What Kodezi OS Does NOT Store

  • Full codebases
  • Credentials or secrets
  • Proprietary business logic
  • User personal data beyond authentication

Temporary data is discarded after use.