Yes. Feel free to request access to our trust center or contact us.
We work with a limited set of trusted third-party service providers to help us provide, improve, and secure our services:
Provider | Purpose |
---|---|
AWS | Infrastructure and hosting |
GCP | Infrastructure and hosting |
Azure Open AI | Large language models |
Heroku | Application hosting |
Clerk | Identity management |
Betterstack | Log management |
Linear | Issue tracking |
Slack | Internal communications |
Sentry | Application monitoring |
PagerDuty | On-call and incident notifications |
Yes, we provide mechanisms for permanent data deletion, as governed by our Terms.
We appreciate the work of security researchers and take all reports seriously. Security vulnerabilities can be reported confidentially to security [at] heal.dev..
We follow responsible disclosure practices and will:
We do not have a compensated bug bounty program yet (stay tuned!). For now, we're very happy to celebrate researchers who submit security findings publicly on social media.
Researchers may report vulnerabilities using the following channels:
We store only the artifacts required to generate, execute, and debug tests — test steps, test variables,logs, screenshots, and (optionally) API keys or seeded credentials.
Testing is automated with Heal!
We also run exploratory QA on all new features to inform what Heal should automate!
Yes, we conduct regular external security audits and assessments to ensure the security and integrity of our platform. Our security program includes:
Summary reports of our security audits are available to enterprise customers under NDA.
Heal.dev is SOC2 type 1, and currently in the observation window for type 2.
Additional details can be found on our trust center.
Yes, for enterprise customers with specific compliance or security requirements, we offer single-tenant deployment option, including single-tenant LLM services. This provides dedicated AI resources that are isolated from other customers' environments. Please contact our sales team to discuss your specific requirements and available options for single-tenant LLM solutions.
Contact support [at] heal.dev if you need Single Sign-On via Security Assertion Markup Language (SAML) or other enterprise-grade authentication controls for your organization.
Heal.dev does not access customer source code. It uses a browser to interacty with your app just as a user would. The only data Heal sees is what the browser sees.
Any access to customer source code is:
Customers maintain full ownership and control of their source code at all times.