Trust
Security & Data Practices
We built prompt1 for developers — people who care deeply about what software does under the hood. This page explains exactly how we handle your data, what the plugin does and doesn't do, and how our infrastructure is secured.
The Data Boundary
✓ What we collect
- Prompt quality signals (clarity score, file ref count)
- Workflow signals (test/lint/build frequency)
- Security signals (permission mode, CLAUDE.md)
- Session metadata (duration, prompt count, tool count)
- Edit accept/reject rates
- Token usage per session
✗ What we never collect
- Source code or file contents
- Prompt text or Claude responses
- File paths or repository names
- Environment variables or secrets
- Keystrokes or screen recordings
- Git diffs or commit messages
Plugin Architecture
The plugin runs locally on your machine as a set of Claude Code hooks. It is open source and auditable — the full source lives in the plugin/ directory of our repository. Key design decisions:
- ◆Async-only — hooks fire after operations complete, zero impact on response time
- ◆Local aggregation — metrics are computed locally before transmission, raw data never leaves your machine
- ◆Fail-open — if the plugin encounters an error, it silently fails without disrupting your workflow
- ◆Uninstall anytime — one command to fully remove all hooks and local data
Infrastructure Security
Encryption
TLS 1.3 in transit. AES-256 at rest. Database connections use SSL with certificate verification.
Authentication
Passwords hashed with bcrypt (cost factor 12). JWT sessions with short expiry. Google OAuth as an alternative.
Isolation
Each organization's data is logically isolated at the database level. Telemetry data is partitioned per-user with label-based access control.
Hosting
Application hosted on Vercel (SOC 2 Type II). Database on Supabase (SOC 2 Type II). Telemetry on dedicated EC2 instances.
Team Privacy Boundaries
For team accounts, managers see aggregated team metrics and individual proficiency scores. Managers cannot see:
- ◆Individual prompt content or session transcripts
- ◆Specific coaching recommendations shown to individual developers
- ◆Minute-by-minute activity timelines
The team dashboard is designed for coaching conversations, not performance reviews.
Incident Response
In the event of a security incident, we commit to notifying affected users within 72 hours. We maintain an incident response playbook and conduct regular security reviews.
Responsible Disclosure
Found a security issue? We appreciate responsible disclosure. Please report vulnerabilities to contact@spectatr.ai. We aim to acknowledge reports within 24 hours and provide a fix timeline within 72 hours.