Security at Capy
SOC 2 compliant, end-to-end encryption, isolated environments. Session data deleted after use.
How We Protect Your Code
From infrastructure to AI providers, every layer is secured.
Infrastructure Security
VPC-isolated infrastructure on AWS with SOC 2 certified data centers. Each workspace runs in an isolated container with no shared state.
AI Provider Security
Strict contractual data-handling terms with all model providers — Anthropic, OpenAI, and Google. Enterprise customers can bring their own API keys for full control.
Data Handling
Minimal metadata retained for billing, support, and security. Session data is deleted after use. All data processed in US-based data centers.
Vulnerability Reporting
We take all security reports seriously and respond within 24 hours. Report vulnerabilities to security@capy.ai.
FAQ
Common questions about security at Capy.
Is my code stored on Capy servers?+
Is Capy SOC 2 compliant?+
How does Capy handle AI provider data?+
Where is my data processed?+
How do I report a security vulnerability?+
Ship with confidence
Enterprise-grade security from day one. Start building with Capy today.