Security

Hyaline is designed with security and privacy as core principles. This page outlines our security practices and what you can expect when using Hyaline.

Data Privacy

We don’t see your code or documentation. Hyaline runs entirely on your infrastructure - whether that’s your local machine, CI environment, or your own servers. Your source code and documentation never leave your control.

No data collection. Hyaline does not send usage analytics, telemetry, or any other data to our servers. We have no visibility into how you use the tool or what content you’re processing.

Local Operation

Hyaline operates as a standalone CLI tool that:

Network Communications

Hyaline only makes network requests when you explicitly configure it to:

These connections are made directly from your environment to the configured services - Hyaline does not proxy or intercept this traffic.

File System Access

Hyaline requires:

The tool respects standard file system permissions and only accesses files within the paths you configure.

Authentication & Secrets

When working with remote repositories or LLM APIs, Hyaline supports:

Best practice: Store all sensitive credentials as environment variables rather than hard-coding them in configuration files.

MCP Server

The MCP server runs locally and provides your documentation to AI tools. Currently:

Reporting Security Issues

If you discover a security vulnerability in Hyaline, please report it to us at:

Email: [email protected]

We take security issues seriously and will respond promptly to any reports.