Security
Trust is the product.
Enyos has access to a lot. We treat that access the way you would — carefully, with the smallest blast radius possible.
Local-first by design
Sensitive context stays on your device. You decide what leaves it and where it goes.
Encrypted end-to-end
TLS in transit. Keychain at rest. Per-integration scoped tokens you can revoke any time.
Minimal data, minimal retention
We store the least we can. Logs are scrubbed and rotated. Memory is yours to delete.
Our practices
- All connections to Enyos services use TLS 1.3.
- Tokens for third-party integrations are stored in the macOS Keychain.
- We follow OWASP ASVS guidelines for the desktop app and the backend.
- Dependencies are scanned continuously; patches are shipped within 7 days for high-severity CVEs.
- We perform regular internal threat-modeling reviews on every major change.
- Production access is gated behind hardware-backed SSO and audit-logged.
Responsible disclosure
If you've found a security issue, we want to hear from you. Please email us with a description, reproduction steps and any relevant artifacts. We aim to acknowledge within 24 hours and to coordinate a fix and disclosure timeline with you. We don't pursue legal action against good-faith security research.
[email protected]