Security
Information about the security measures and privacy policies at Ellipsis
Ellipsis takes the security of your code very seriously.
- Hosting: Our services are hosted on AWS. The security model of AWS is extensively documented here.
- LLM Providers: Our LLM providers (OpenAI/Azure OpenAI) do not use data from API requests to train models. You can find their policies here: OpenAI, Azure OpenAI.
- Logging: We use PromptLayer for logging LLM requests to allow our engineers to provide production support.
SOC 2 Type 1 Certification
Ellipsis is SOC 2 Type 1 compliant. For reference, SOC 2 is an industry standard for security compliance. It requires organizations to establish extensive security guidelines and policies and obtain certification through a thorough third-party audit.
To request a copy of our report, please contact us.
Opting out of Logging
If you want to opt out of all logging (internal and to PromptLayer), you can disable it in the Settings
page of app.ellipsis.dev, or add the following line to your ellipsis.yaml
configuration:
version: 1.3
settings:
third_party_logging_enabled: false
Note that this will restrict our ability to provide you support.
On-premise Deployments
Contact us if you are interested in deploying Ellipsis in your own AWS, GCP, or Azure account.
Code Generation
For code generation workflows with a Dockerfile, Ellipsis checks out your project on our servers in AWS, where code is automatically deleted when workflows are completed and never persisted between workflows. Our servers run in a private VPC with security group rules that prevent unwanted access.
Vulnerability Disclosure Program
We take the security of our systems seriously and appreciate the efforts of security researchers who help us improve our security posture. If you believe you have found a security vulnerability in our systems, we encourage you to disclose it to us in a responsible manner.
Disclosure Policy
Make a good faith effort to avoid data destruction, privacy violations, and interrupting or degrading services.
Report vulnerabilities to help@ellipsis.dev
Safe Harbor
We will not pursue legal action against researchers who make a good faith effort to follow this VDP.
Bug Bounty Program
Regretfully, at this time we do not offer a bug bounty pool.