How we keep your code and data safe
When you submit a repository for analysis, we perform a shallow clone (minimal history) of the repository, run our analysis pipeline against it, and delete the clone immediately after processing is complete. Your source code is never stored on our servers beyond the time needed for analysis.
If you discover a security vulnerability in Repobility, we encourage responsible disclosure. Please report it to [email protected].
We maintain a bug bounty program for qualifying security vulnerabilities. Severity, scope, and reward details are available upon request. Contact [email protected] for our current bug bounty policy and scope.