Source code boundary
ImplementedRepository source, env files, and API keys are not uploaded by the CLI.
Security, privacy, compliance posture, subprocessors, and vulnerability disclosure for the 0dai agentic knowledge layer.
Current release
v4.1.0
Core MCP tools
49
Registered MCP tools
103
Primary data model
Local-first
Compliance
This page distinguishes implemented controls, dogfood enforcement, and planned compliance work. Certification claims appear only after evidence exists.
Repository source, env files, and API keys are not uploaded by the CLI.
Agent work is guarded by issue-first, tasklist, scope, and worktree hygiene checks.
Formal certification is not claimed. Evidence collection and control mapping are planned.
The free graph is file-backed today. A paid Postgres/Supabase substrate is planned.
Documents
The first public packet is intentionally small: current public documents, product facts, and a request path for enterprise review.
What we collect, what stays local, and how project telemetry is handled.
Service terms, acceptable use, billing, and account responsibilities.
Activation-first install path and local project wiring.
Free local graph, Pro access, and planned Team cloud graph capabilities.
Public source, issues, pull requests, and release history.
Available by request while the formal trust packet is being assembled.
Security Controls
0dai focuses on the failures that hurt agentic development: secret exposure, repo pollution, unscoped delegation, stale memory, and unreviewed destructive actions.
0dai builds context from manifest files, metadata, and generated ai/ artifacts without sending repository source code by default.
Cloud-facing features start from explicit activation and are constrained by the account plan.
Model provider use is operator-controlled. Customer keys stay in local secret storage when BYOK is used.
Agents are expected to isolate task branches, detect unrelated changes, and keep mergeable work from piling up.
Non-trivial agent dispatch is checked for linked issue, tasklist, profile, scope, plan, and acceptance criteria.
The project runs targeted tests plus security-oriented scans such as secret and dependency checks. Some scans report findings as warnings while gating is hardened.
Operational decisions, memory rule access, and agent activity are recorded into append-only project logs.
Database migrations and destructive actions require explicit human review before execution.
Data Handling
The trust boundary is built around what the CLI needs for project intelligence versus what must remain on the operator machine.
File-backed graph
Secrets stay local
Audit-ready logs
Source files, .env files, credentials, private keys, and raw repository contents stay on the operator machine unless explicitly shared outside 0dai.
Account state, plan tier, CLI version, command outcome telemetry, generated manifest summaries, and support reports may be used for cloud features.
The free product uses a file-backed local graph in the repository. It is designed for inspection and portability.
Paid shared knowledge graph capabilities are planned on a Postgres/Supabase-backed substrate, not shipped as a completed graph database today.
Subprocessors
This is the public provider view for current product posture. A formal exportable subprocessor register should follow before enterprise launch.
OAuth sign-in where enabled
Identity claims and account linkage
Billing and checkout flows where available
Payment session metadata
Product usage analytics
Aggregated web events and project telemetry described in the Privacy Policy
AI execution through BYOK or local configuration
Only the context the operator intentionally sends to that provider
0dai website, dashboard, API, and cloud services
Operational logs, account metadata, and service telemetry
Report suspected security issues to hello@0dai.dev. Include impact, reproduction steps, affected versions, and whether sensitive data was exposed.
CLI, website, dashboard, public API endpoints, generated ai/ layer, docs, and agent protocol guardrails.
Social engineering, destructive testing against customer repositories, spam, and high-volume rate-limit noise.
FAQ
Short answers for security reviews, procurement, and teams deciding whether 0dai fits their repo boundaries.
No by default. The public posture is local-first: source files, secrets, and env files are not uploaded by the CLI.
Not yet. We do not claim those certifications. This page separates implemented controls from planned compliance work.
No. The free graph is file-backed today. A paid cloud graph substrate is planned and will be documented separately before launch.
Yes. Email hello@0dai.dev and include the plan, data-flow questions, and procurement requirements you need answered.