Infrastructure & Hosting
The backend runs entirely on AWS using managed services and regional isolation options.
AWS Cloud
SeeCodes is hosted on Amazon Web Services and uses managed services such as API Gateway, Lambda, DynamoDB, and S3 that comply with SOC 1, SOC 2, and SOC 3 standards.
Regional Isolation
Administrators can choose to process and store data in the US, EU (Stockholm), or UK (London).
Data Encryption
Encryption is applied both in transit and at rest.
In transit
All traffic between the IDE, Jira, and the backend is protected with TLS 1.2 or higher.
At rest
Persistent configuration and telemetry data, along with temporary task uploads, are encrypted at rest with AES-256 via AWS KMS.
Data Retention & Ephemerality
SeeCodes minimizes the footprint of proprietary code on the service.
- Short-lived task artifacts: selected source files, uploaded task inputs, AI outputs, and generated diff bundles are written only to the temporary task bucket for the active run.
- Automatic deletion: the temporary run bucket is purged automatically within 48 hours of task completion.
- No permanent raw repository mirror: SeeCodes does not keep a long-lived full clone of your repository as part of the normal task execution path.
- Project index caching is limited to per-file hashes and AI-generated explainer summaries used for context reuse, not a full checkout or a permanent archive of run payloads.
AI Model Privacy
SeeCodes routes model calls through secure, business-to-business integrations.
Zero training policy
Source code, prompts, and Jira data are never used by underlying AI providers to train their public or foundational models.
AI requests are routed through managed B2B model integrations. Customer code, prompts, Jira data, and generated task artifacts are not used to train public models.
Vulnerability Management
Operational access is restricted and the delivery pipeline includes automated checks.
- Automated dependency scanning and static application security testing (SAST) are part of the CI/CD pipeline.
- Production infrastructure access is limited to authorized eprojac engineers using SSO, MFA, and audited bastion hosts.
Enterprise procurement
If you need security questionnaires or additional architectural detail, contact security@seecodes.com.