Security & Privacy

Your code is your intellectual property. We take security seriously so you can focus on building.

Our Security Principles

Local-First Processing

All AI processing happens on your machine. Your code never leaves your device unless you explicitly choose to use cloud features.

Zero Telemetry by Default

We don't collect usage data, code snippets, or personal information without your explicit consent.

End-to-End Encryption

When you do use cloud features, all data is encrypted in transit and at rest using industry-standard protocols.

Open Source Core

Our core engine is open source, allowing security researchers to audit our code and verify our claims.

Local-First Architecture

Unlike cloud-based AI coding assistants, Kepler runs entirely on your machine. This means your code, your data, and your intellectual property never leave your device.

Our AI models are optimized to run locally on modern hardware, providing fast, intelligent assistance without the security risks of cloud processing.

No Network Calls
AI runs offline
Zero Data Upload
Code stays local
Full Control
You own your data

Security Features

Data Protection

  • Local AI model execution
  • No code uploaded to servers
  • Encrypted local storage
  • Secure credential management
  • Automatic session timeout

Enterprise Security

  • Single Sign-On (SSO)
  • SAML 2.0 support
  • Role-based access control
  • Audit logs and monitoring
  • Custom security policies

Development Security

  • Dependency vulnerability scanning
  • Secret detection in code
  • License compliance checking
  • Code signing and verification
  • Sandboxed execution environment

Compliance & Certifications

SOC 2 Type II
Certified
GDPR
Compliant
CCPA
Compliant
ISO 27001
In Progress

We undergo regular third-party security audits and maintain compliance with industry standards.

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it to us responsibly.

Report security issues to:
security@keplerai.in
We commit to:
  • • Respond within 24 hours
  • • Provide regular updates on our investigation
  • • Credit researchers in our security advisories
  • • Offer bug bounties for qualifying vulnerabilities

How We Handle Your Data

What We Collect

By default, we collect minimal anonymous usage statistics to improve the product:

  • • Feature usage counts (no code or content)
  • • Performance metrics
  • • Crash reports (opt-in only)

What We Don't Collect

  • • Your source code
  • • File names or project structure
  • • Personal information
  • • Keystrokes or editor content
  • • Git history or commits

Your Control

You have complete control over data collection. Disable all telemetry in settings with a single click. No questions asked, no degraded experience.

Questions About Security?

Our security team is here to help