Security

How we keep your data safe.

✓ No prompt storage

We never store your prompts or AI responses on our servers.

✓ TLS everywhere

All traffic encrypted in transit with TLS 1.3.

✓ Direct BYOK

Bring your own key traffic goes straight to provider.

✓ Local-first

Config, context, and history stay on your machine.

Architecture

linuxtoaster uses a two-component architecture designed for security and performance:

Your API keys never leave your machine. The toastd daemon holds credentials in memory and makes authenticated requests on your behalf.

BYOK Security

When using Bring Your Own Key:

toast → toastd → provider (direct, encrypted)

Managed Service Security

When using linuxtoaster's managed API:

toast → toastd → linuxtoaster.com → provider (all encrypted)

Local Storage

Sensitive files are protected with appropriate permissions:

~/.ssh/toaster (600) Your private ssh key for LinuxToaster.Com
~/.ssh/toaster.pub (600) Your public ssh key for LinuxToaster.Com

Project files (.crumbs, .chat, .persona) use standard file permissions and are not encrypted. Treat them like any other source file.

Network Security

Vulnerability Disclosure

Found a security issue? We appreciate responsible disclosure.

Email security@linuxtoaster.com with details. We'll respond within 48 hours and work with you on a fix timeline.

Please do not publicly disclose vulnerabilities until we've had a chance to address them.

Audit & Compliance

We welcome security audits from qualified researchers. Contact us for access to discuss audit arrangements.