Features Agents Observer Pricing Developers Download Free

Security & Privacy, in plain language.

What stays on your device, what crosses the network, what we collect, and how the trust rails work for AI proxy traffic and GUI automation. This page is the plain-English explainer; the legally binding text lives in the Privacy Policy and Terms.

Last updated: 2026-05-01 · Questions? contact@marmut.app

Contents

  1. What stays local
  2. What crosses the network
  3. How auto-redaction works
  4. What the desktop sends home
  5. Auth + payments
  6. GUI automation safety rails
  7. Audit log + replay
  8. Enterprise data flow
  9. Binary signing + verification
  10. Responsible disclosure

01What stays local

SuperBased is a desktop-first product. The default for almost everything is "stays on your device until you explicitly do something that crosses the network."

02What crosses the network

Three categories of network traffic, all on opt-in or explicit-action paths:

WhatWhenWhere
License + version checkApp start (after 15s) + every 4hapi.superbased.app
AI request (chat / vision)You explicitly invoke superbased_ai or click the AI buttonapi.superbased.app → upstream provider
Voice transcriptionYou release the dictation hotkeyapi.superbased.app → Whisper / Azure Speech
Auto-update checkEvery 4h (electron-updater)S3 latest mirror
Anonymized usage eventsBatched, on app closeapi.superbased.app/api/v1/usage

That's it. No background screenshot upload. No telemetry on individual captures. No "phone home" pulses while you work. The desktop's per-feature defaults all bias toward local processing — even the dictation pipeline does filler removal, deduplication, and short-phrase normalization locally before any AI cleanup roundtrip.

03How auto-redaction works

When you enable auto-redaction (Settings → Privacy), the redaction pipeline runs locally, before any image is copied, sent, or shared. It detects and pixelates regions matching the following categories:

Detection runs over the OCR text layer (which itself is computed locally via Tesseract). Matches get pixelated as image overlays; the original screenshot file on disk is unchanged unless you explicitly save the redacted version. Compressed images via the Token Compression Engine go through the same redaction pipeline — same patterns, same locality.

Honest scoping. Pattern-based detection catches the common cases. It is not a substitute for human review of sensitive screenshots. For maximum security, always inspect a screenshot before sharing it.

04What the desktop sends home

The desktop and headless binaries send four kinds of network traffic to api.superbased.app:

The website (superbased.app) uses no analytics by default. Plausible is being evaluated for consent-gated, cookie-less analytics; until it ships, the website does not track visitors.

05Auth + payments

Authentication is handled server-side via the Clerk Backend API. The Go backend authenticates email/password and OAuth (Google, GitHub) flows on the server side and issues custom HMAC-SHA256 JWTs containing your Clerk user ID, email, and name. The desktop receives the JWT via a deep link (superbased://auth-callback?token=...) and stores it encrypted via OS-level secure storage (DPAPI on Windows, Keychain on macOS).

06GUI automation safety rails

The GUI automation surface (the "Agent Hands" capability — see /agents) is the most privileged thing SuperBased exposes. The defaults err toward refusal at every layer:

Default-deny, opt-in model. Out of the box, an agent calling superbased_click gets {ok:false, error:"GUI_AUTOMATION_DISABLED"} with a hint to enable the master toggle. The user retains complete control over whether and when their agent can drive the screen.

07Audit log + replay

Every GUI automation action — accepted or refused — is appended to ~/.superbased/audit.log as one NDJSON line. Each entry contains:

You own this log. Inspect it any time with cat ~/.superbased/audit.log | jq. Delete it any time. superbased_replay reads it back to reproduce a specific session — useful for debugging an agent that went off the rails, or for stepping through a flow that worked in production for inspection.

08Enterprise data flow

Enterprise tier customers get additional surfaces with explicit data ownership:

09Binary signing + verification

Every desktop release is signed and notarized. Verify your install matches a known-good build before running:

10Responsible disclosure

If you find a security issue — in the desktop app, the headless CLI, the backend API, the MCP server, the GUI automation surface, or any of the plugin distributions — email contact@marmut.app with the subject line "Security disclosure."

We commit to:

Out of scope: any test that affects production users (DoS, brute-forcing prod credentials, data exfiltration of other customers' content, social engineering of staff).

Bug bounty. We don't currently run a paid bounty program. If you've reported a meaningful issue, we'll credit you publicly (with permission) on the changelog and send a thank-you note.