Trust Center

Your Trust, Our Priority

At Zeropath, every decision we make puts our customers first. Security, data privacy, compliance, and reliability matter to you so they're non-negotiable for us.

Compliance

SOC2 Type II certified, demonstrating our commitment to security, availability, and confidentiality.

Pentesting

Annual external pentests and active vulnerability disclosure program ensure continuous security improvement.

Privacy & GDPR

Fully GDPR compliant with transparent data handling. We don't retain data beyond what's necessary.

View privacy policy →

Availability

Industry-leading uptime with real-time monitoring and transparent reporting of service status.

Check status page →

Security Architecture & Data Protection

How We Handle Your Code

Scanning Process

  • Each repository scan runs in an isolated Docker container
  • Each scan gets its own dedicated container environment
  • Code is retained for 30 days to enable patch generation, Q&A interactions, and quick re-scanning
  • After 30 days, source code is automatically deleted from our systems

Data Retention

Data TypeRetention PeriodPurpose
Source code30 daysPatch generation, Q&A, re-scanning
Vulnerability findingsUntil deletion requestedHistorical tracking and reporting
Generated patchesUntil deletion requestedPull request creation
Scan metadataUntil deletion requestedDashboard and analytics

All data is permanently deleted when:

  • • You request deletion through our support team
  • • You delete your account
  • • Your account is inactive for 24 months

Infrastructure Security

AWS Infrastructure

  • Hosted in AWS US-West-2 region
  • Encrypted at rest using AWS default encryption (AES-256)
  • All data transfers encrypted using Cloudflare's encryption suite (TLS 1.3)
  • Regular vulnerability scanning of our infrastructure
  • Each scan runs in its own isolated Docker container

Access Controls

  • Repository access tokens are securely stored using AWS default encryption
  • API authentication uses private and secret key pairs
  • Multi-party verification required for any employee access to customer data
  • All employee accounts require multi-factor authentication through Google Workspace

AI and Model Security

ZeroPath maintains enterprise agreements with our AI model providers (including OpenAI and Anthropic) that explicitly prohibit:

  • Training on customer data
  • Retaining customer inputs beyond processing
  • Using customer code for model improvement

Your proprietary code is never used to train or improve AI models.

Security Practices

Continuous Security Monitoring

  • Automated vulnerability scanning of our infrastructure
  • Security awareness training for all employees (managed through our SOC 2 provider)
  • Annual penetration testing by independent third parties
  • Active vulnerability disclosure program

Compliance Training

All ZeroPath employees complete mandatory security training covering:

  • Data handling procedures
  • Customer data privacy
  • Incident response protocols
  • GDPR requirements

On-Premises Deployment

For organizations requiring complete control over their data, ZeroPath offers deployment within your own cloud infrastructure:

  • Deploy to your AWS, Azure, or GCP account
  • Your code never leaves your environment
  • Full control over data retention policies
  • Managed through Pulumi infrastructure-as-code

Contact our team at [email protected] to discuss on-premises deployment options.

Third-Party Subprocessors

ZeroPath uses industry-standard third-party services including:

  • Cloud infrastructure providers (AWS)
  • AI model providers (OpenAI, Anthropic)
  • Payment processing (Stripe)
  • Analytics and monitoring services
  • Content delivery and security services (Cloudflare)

For a complete list of subprocessors, please contact [email protected].

Operational Security

Secure Development

  • All code changes undergo mandatory code review
  • We scan our own codebase with ZeroPath (dogfooding)
  • Security vulnerabilities are prioritized and patched within SLA

Incident Response

  • Documented incident response plan with defined escalation procedures
  • Customer notification within 72 hours of confirmed security incidents
  • Post-incident reports available upon request

Audit Logging

  • Comprehensive audit logs track all sensitive actions
  • Available through your dashboard
  • Includes authentication events, configuration changes, and data access
  • Logs retained for 12 months

Support Commitments

24-hour response time

for support requests

Priority support

available for enterprise customers

Immediate attention

for security issues

Data Management

Data Isolation

  • Logical separation of customer data at the database level
  • Row-level security policies enforce access controls
  • Each customer's data is tagged with unique identifiers

Data Export

  • Full data export available upon request
  • Contact [email protected] for data export
  • Exports provided in JSON format within 5 business days

API Security

  • Configurable rate limits available for enterprise customers
  • API tokens use secure key pairs (public and private keys)
  • All API calls are authenticated and encrypted

Legal and Compliance

Data Processing Agreement (DPA)

  • Standard DPA available for all customers
  • Covers GDPR requirements and data protection obligations
  • Available at [email protected]

Right to Audit

  • SOC 2 Type II report available under NDA
  • Additional security questionnaires supported
  • Virtual audits can be arranged for enterprise customers

Data Privacy FAQs

A: Employee access to customer data requires multi-party verification and is logged. This access is only granted for critical support issues and with customer consent when possible.
A: All data is stored in AWS US-West region data centers.
A: Upon request, we can delete all your data within 72 hours. Contact [email protected] for deletion requests.
A: Your data is retained for 24 months of inactivity to allow for easy reactivation. After this period, all data is permanently deleted.

Security Inquiries

For security inquiries or to report vulnerabilities, please contact:

General security questions:

[email protected]

Vulnerability disclosure:

https://zeropath.com/disclosure