We use industry-standard security practices to protect your screenshots, test results, and source code.
Enterprise-grade security built into every layer of our platform.
We leverage Google Cloud's security features to keep your data safe.
Cloud Infrastructure: All services run on enterprise-grade cloud infrastructure with network isolation and private networking.
Container Security: All services run with minimal privileges and are regularly scanned for vulnerabilities.
API Security: Rate limiting, request validation, and token-based authentication protect all API endpoints.
Backup & Recovery: Automated daily backups with point-in-time recovery.
Monitoring: Continuous security monitoring with automated threat detection and incident response.
We're committed to achieving industry-standard compliance certifications as we grow.
We are planning to pursue SOC 2 Type II, GDPR, and CCPA compliance certifications. These are on our roadmap as we continue to enhance our security and privacy practices.
Transparency about data processing and retention.
| Data Type | Collected | Retention | Purpose |
|---|---|---|---|
| Screenshots | Yes | 7 days (candidates), kept until deleted (baselines) | Visual comparison |
| Page Structure | Yes | 7 days (candidates), kept until deleted (baselines) | Structural comparison |
| CSS Styles | Yes | 7 days (candidates), kept until deleted (baselines) | Style analysis |
| Performance Metrics | Yes | 7 days | Regression detection |
| Source Code | Never | N/A | Not stored or accessed |
| User Data | Yes | Until deletion | Account management |
| API Keys | Yes | Rotatable | Authentication |
Baselines are the approved reference screenshots for your tests. They are kept until you explicitly delete them or delete all project data.
Candidates are screenshots from each test run that are compared against baselines. They are automatically deleted after 7 days to save storage.
You can export all your project data as a ZIP file at any time, or permanently delete all data (including baselines) from your project settings.
If you discover a vulnerability, please report it responsibly.
For security concerns or questions, contact our security team directly.