Privacy Policy

Last updated: 5/19/2026

At AppAudix, LLC ("AppAudix," "we," "us," "our"), we are committed to protecting your privacy and ensuring the security of your data. This Privacy Policy explains how we collect, use, store, and protect your information when you use our mobile application security scanning service ("Service").

Our Security Commitment

We implement industry-leading security measures including AES-256 encryption, automatic file deletion after 30 days, secure isolated analysis environments, and strict access controls to ensure your data remains secure and private.

1. Information We Collect

1.1 Mobile Application Files

When you upload your mobile application (APK for Android or IPA for iOS) for security scanning, we temporarily store these files on our secure cloud infrastructure. We do not require access to your source code - only the compiled application binary that you would distribute through app stores.

The compiled application binary you provide is the exact file distributed through app stores. It is all we need to perform comprehensive security analysis and PCI-DSS compliance assessment.

  • Encrypted using AES-256 encryption during transit (TLS 1.3) and at rest
  • Processed in secure, isolated analysis environments with no persistent storage
  • Application files are only kept in temporary storage (RAM) during scanning, and are then securely deleted once the report is available
  • Never shared with third parties except as required by law

1.2 Account Information

When you create an account, we collect:

  • Email Address: Required for account creation, authentication, and communication
  • Password: Stored using industry-standard hashing algorithms (bcrypt)
  • Account Preferences: Settings and preferences you configure
  • Subscription Information: Your selected pricing plan and subscription status

1.3 Scan Results and Reports

We store scan results and security reports associated with your account, including:

  • Vulnerability findings and security assessments
  • PCI-DSS compliance analysis results
  • Historical scan data and trends
  • Application metadata (name, version, package identifier)

1.4 Payment Information

For paid services, payment processing is handled by Stripe. We do not store complete credit card numbers or sensitive payment information on our servers. We receive only tokenized payment identifiers and billing records.

1.5 Usage Analytics

With your permission, we collect usage analytics such as page paths, referrers, browser and device information, country, IP address, and product events to improve our Service and understand where visitors drop off. We use PostHog for product analytics and first-party pageview logs for traffic monitoring. Marketing pixels are used only if you allow marketing cookies.

2. How We Use Your Information

Primary Service Provision

  • Perform security scanning and vulnerability analysis
  • Generate security reports and compliance assessments
  • Provide access to scan history and results

Account Management

  • Authenticate your access to the Service
  • Process subscription payments and billing
  • Provide customer support

Service Improvement

  • Improve scanning algorithms and detection
  • Enhance service performance and reliability
  • Identify and fix technical issues

Security & Fraud Prevention

  • Detect and prevent unauthorized access
  • Identify fraudulent activity
  • Protect the integrity of our Service

3. How We Protect Your Data

3.1 Encryption

All sensitive data is protected using encryption:

  • TLS 1.3 for data in transit
  • AES-256 for stored files
  • Encrypted database storage
  • Encrypted backups

3.2 Infrastructure Security

Our infrastructure is protected by SOC 2 Type II certified providers, network segmentation, intrusion detection systems, and regular security assessments.

3.3 Data Retention

  • Application Files: Application files are only kept in temporary storage (RAM) during scanning, and are then securely deleted once the report is available.
  • Scan Reports: Retained according to your subscription plan for historical analysis.

4. Artificial Intelligence & Data Isolation

Zero Third-Party AI Data Sharing — Guaranteed

Your application binaries, scan reports, vulnerability findings, penetration test results, and any other customer data are never shared with, sold to, transmitted to, or made accessible to any third-party artificial intelligence company — including but not limited to OpenAI, Anthropic, Google, Meta, Microsoft, Mistral, or any other AI model provider. This is a non-negotiable architectural guarantee, not a policy promise.

4.1 How We Use AI

AppAudix uses artificial intelligence to power certain features of our security analysis platform, including automated vulnerability assessment, compliance mapping, and AI-driven penetration testing. AI enhances the depth and accuracy of our analysis but operates under strict data isolation controls.

4.2 Application Binaries Never Leave Our Infrastructure

Your uploaded application files (APK, AAB, IPA) are processed exclusively on AppAudix-controlled infrastructure. Application binaries are never transmitted to any external AI service, API, or model provider under any circumstances. All static analysis, decompilation, binary inspection, and dynamic testing occurs entirely within our own secured servers and physical device lab.

4.3 AI Analysis Operates on Metadata Only

Where AI is used to assist with security analysis, it operates on structured metadata and scan findings — not raw application code or binaries. This includes:

  • Categorized vulnerability findings (type, severity, location references)
  • Configuration analysis results (e.g., "TLS pinning not detected")
  • Compliance mapping data (framework requirement pass/fail status)
  • Structured observations from dynamic testing (e.g., "application detects root on Device A but not Device B")

At no point does raw application source code, decompiled code, proprietary business logic, encryption keys, API credentials, or customer intellectual property get transmitted to any AI model or service.

4.4 No AI Training on Customer Data

No customer data of any kind is used to train, fine-tune, or improve any artificial intelligence model — whether operated by AppAudix or any third party. Specifically:

  • No training on application binaries
  • No training on scan reports
  • No training on vulnerability findings
  • No training on penetration test results
  • No training on account or usage data
  • No training on any customer metadata

Any external AI API usage is governed by enterprise-grade agreements that contractually prohibit the AI provider from retaining, logging, or using input/output data for model training or any other purpose beyond processing the immediate request.

4.5 Ephemeral Processing & Zero Retention

Where AI API calls are made as part of the analysis pipeline, they are processed ephemerally:

  • Zero retention: AI providers are contractually prohibited from storing any request or response data beyond the duration of the API call
  • Zero logging: No customer data from API calls is written to AI provider logs, telemetry, or monitoring systems
  • No human review: Customer data processed via AI APIs is not subject to human review, quality assurance sampling, or trust and safety review by the AI provider
  • Stateless processing: Each AI interaction is independent and stateless — no customer context, history, or data persists between requests at the AI provider

4.6 Public AI & Chatbot Exclusion

To be unambiguous: customer data is never processed by, sent to, or made available through any public-facing AI product. This includes but is not limited to ChatGPT, Claude, Gemini, Copilot, LLaMA, or any consumer AI chatbot, assistant, or search tool. Our AI usage is strictly limited to isolated, private API endpoints operating under enterprise data protection agreements with zero-retention guarantees.

4.7 Ongoing Commitment

We continuously review and audit our AI data handling practices. If we introduce new AI capabilities in the future, they will be subject to the same strict data isolation, zero-retention, and zero-training guarantees described above. We will update this policy to reflect any changes, and existing customers will be notified of material updates.

Contact Us

If you have any questions about this Privacy Policy or our data practices, please contact us at privacy@appaudix.com.

Cookie preferences

We use necessary storage for security and login. With your permission, we also use analytics to understand page journeys and marketing pixels to measure ad campaigns.