1. Information We Collect
- From You: When you sign up, we collect your name, email, and organization name.
- From the Service: We temporarily access your source code to scan it. We do not permanently store your source code. We only save the vulnerability metadata (e.g., “SQL Injection found on line 45”).
2. Data Hosting (Middle East Region)
To comply with local data sovereignty laws across the GCC, your data is stored securely in local, enterprise-grade cloud regions (such as Google Cloud).3. Your Rights
Under GCC privacy laws, you have the right to:- View, correct, or update your data.
- Ask us to delete your data when you no longer need our service.

