Security & Trust Center
Last updated: March 23, 2026
Our Commitment
At CodeContext, security is foundational to everything we build. Your coding standards, API specifications, and organizational data are critical assets, and we treat their protection as our highest priority.
This page provides an overview of the security measures and practices we employ to protect your data.
Data Encryption
We use industry-standard encryption to protect your data:
- In transit: All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher. We enforce HTTPS on all connections and use HSTS headers to prevent downgrade attacks.
- At rest: All data stored in our databases and backup systems is encrypted using AES-256 encryption (including infrastructure-level encryption provided by our database host).
- Credentials: Passwords are hashed using modern, industry-standard hashing algorithms with unique salts. We never store passwords in plain text.
- Application-level encryption (Enterprise): Enterprise organizations may optionally enable additional encryption for coding standards and API specification content using AES-256-GCM, with per-organization data encryption keys.
- Bring your own key (BYOK): Enterprise customers may supply and manage their own encryption keys (customer-managed keys) instead of using platform-managed keys, subject to configuration and support from our team.
- Key lifecycle: Encryption keys support rotation. Scheduled key revocation includes a 72-hour cooling-off period during which the revocation can be cancelled; after that period, revocation is finalized.
- Crypto-shredding: After a key is revoked and no longer available to the service, ciphertext for content encrypted under that key cannot be decrypted, which provides a strong form of data destruction for that encrypted content.
Authentication & Access
We provide robust authentication and access control features:
- Multi-factor authentication (MFA): Available for all accounts to add an extra layer of security
- Session management: Secure, server-side session handling with automatic expiration
- Role-based access control: Granular permissions (owner, admin, member) to control who can access and modify resources
- API key management: Scoped API keys with read-only or read-write permissions, revocable at any time
- SSO integration: Support for Single Sign-On for organizations that require centralized identity management
Infrastructure Security
Our infrastructure is designed for security and reliability:
- Hosted on enterprise-grade cloud infrastructure with SOC 2 and ISO 27001 certifications
- Network isolation and firewall rules to restrict unauthorized access
- Regular security patches and updates applied to all systems
- Distributed denial-of-service (DDoS) protection
- Geographic redundancy to ensure high availability
Application Security
We follow security best practices in our application development:
- Parameterized database queries to prevent SQL injection
- CSRF protection on all state-changing operations
- Content Security Policy (CSP) headers to mitigate cross-site scripting
- Input validation and sanitization on all user inputs
- Regular security code reviews and automated vulnerability scanning
- Rate limiting on authentication endpoints and APIs to prevent brute-force attacks
Data Backup & Recovery
We maintain comprehensive backup and disaster recovery procedures:
- Automated daily database backups with point-in-time recovery capability
- Backups are encrypted and stored in geographically separate locations
- Regular backup restoration testing to verify data integrity
- Documented disaster recovery procedures with defined recovery time objectives
Monitoring & Incident Response
We continuously monitor our systems for security threats:
- Real-time monitoring of application and infrastructure health
- Automated alerting for anomalous activity and potential security incidents
- Audit logging of administrative actions and security events
- Documented incident response plan with defined escalation procedures
- Post-incident reviews to identify root causes and prevent recurrence
In the event of a security incident that affects your data, we will notify affected users promptly in accordance with applicable laws and regulations.
Compliance
We are committed to meeting the data protection requirements of our users:
- GDPR: We provide data processing agreements, support data subject rights, and implement appropriate technical and organizational measures
- CCPA/CPRA: We honor California consumer privacy rights and do not sell personal information
- We regularly review and update our practices to align with evolving privacy regulations
Vendor Security
We carefully evaluate the security practices of all third-party vendors and service providers before integrating them into our platform. Our vendor assessment includes:
- Review of security certifications and compliance reports
- Evaluation of data handling and privacy practices
- Contractual obligations for data protection and breach notification
- Ongoing monitoring of vendor security posture
Responsible Disclosure
We value the work of security researchers and welcome reports of potential vulnerabilities. If you discover a security issue, please report it to us responsibly:
- Email your findings to security@codecontext.app
- Provide sufficient detail for us to reproduce and verify the issue
- Allow us reasonable time to investigate and address the vulnerability before any public disclosure
- Do not access or modify other users' data during your research
We are committed to working with researchers in good faith and will not pursue legal action against those who report vulnerabilities responsibly.
Contact
For security-related inquiries or to report a vulnerability:
- Security reports: security@codecontext.app
- General inquiries: support@codecontext.app
- Company: The Virdi Co.