Policy version: 1.0
Last updated: 2025-01-06
DeviceLink enforces a strict access boundary: all file operations are scoped to folders explicitly shared by the user. Paths must be relative to a shared folder root.
Secrets and private keys are not committed to source control. In production, secrets are provided via secure runtime configuration (e.g., Fly.io Secrets) and are not exposed through public routes.
DeviceLink aims to avoid logging file contents, OAuth tokens, or private key material. Logs are limited to operational metadata and high-level diagnostics.
If you believe you have found a security vulnerability, please report it responsibly. Send details to security@devicelink.ai. Please include steps to reproduce and any relevant logs.
We aim to acknowledge reports promptly and work with you on remediation. Please do not publicly disclose vulnerabilities before we have had a reasonable opportunity to investigate and address the issue.