Tuscanolabs Trust Documentation

    Security

    Our commitment to protecting customer data

    Security Overview

    TuscanoLabs is built around a small set of concrete security practices we can describe in plain language. This page lists what we actually do — not what we'd like to one day do.

    Encryption

    All traffic to TuscanoLabs is served over TLS. Sensitive credentials such as GitHub OAuth tokens are encrypted at rest using AES-GCM with a key managed outside the database. The underlying database storage is also encrypted at rest by our hosting provider.

    Access Control

    Every database table that holds customer data has row-level security policies enforcing per-account access. Reports, scan findings, conversion outputs, and stored source files are scoped to the user that created them and cannot be read or modified by other users. API endpoints verify a signed JWT on every request.

    Data Retention

    Source files uploaded with a scan are stored alongside the report so that conversion preview, Convert All, regeneration, and ZIP download work. These source snapshots are automatically purged 30 days after the scan, or immediately when you delete the report.

    Reports themselves are retained until you delete the report or your account. Deleting a report removes the report metadata, findings, converted artifacts, and any source snapshot stored alongside it.

    Application Security

    Day-to-day security practices we maintain:

    • Rate limiting on expensive endpoints (scans, AI conversion) to prevent abuse
    • CAPTCHA (Cloudflare Turnstile) on public scan endpoints
    • Sanitized application logs that strip secrets and source content
    • Dependency monitoring and routine updates of third-party packages
    • Sentry-based crash reporting so we catch and fix issues quickly
    • Code review on every change before it ships to production

    Subprocessors

    TuscanoLabs is built on a small number of vetted infrastructure providers. The full list and their roles is in our Privacy Policy.

    Responsible Disclosure

    If you believe you have found a security vulnerability in TuscanoLabs, please report it to security@tuscanolabs.com. We treat security reports as a top priority and will acknowledge receipt as quickly as possible.