Security & Privacy
Understand how Kodezi OS safeguards your code, data, workflows, and development process.
Security is fundamental to Kodezi OS. Because it interacts deeply with your repositories, issue trackers, and CI/CD workflows, it uses strict security standards to protect your codebase and organizational data.
Data Protection
Code Security
Kodezi OS follows enterprise grade protection:
- End-to-end encryption for all code transfers
- No permanent storage of source code
- SOC 2 compliant infrastructure
- Regular penetration tests and audits
Kodezi processes code temporarily only to generate fixes or insights.
Access Control
Security Controls
- Role based access permissions
- OAuth based authentication
- Restrictive repository access
- Full audit logging of automated changes
Every healing action, PR creation, or refactor is fully traceable.
Privacy Policy
What Kodezi OS Accesses
Used only during active operations:
- Code structure and patterns
- Error logs and stack traces
- Commit and PR history
- Issue tracking data
What Kodezi OS Does NOT Store
- Full codebases
- Credentials or secrets
- Proprietary business logic
- User personal data beyond authentication
Temporary data is discarded after use.