Security Guarantees
What repr Never Does
- ✗ Make background network calls
- ✗ Send telemetry or analytics
- ✗ Store API keys in config files
- ✗ Upload code without explicit user action
- ✗ Run daemons or background processes
- ✗ Access your source code (only reads git metadata)
What repr Always Does
- ✓ Runs entirely locally by default
- ✓ Stores everything in
~/.repr/on your machine - ✓ Uses OS keychain for sensitive data (API keys)
- ✓ Provides audit logs of all network activity
- ✓ Allows permanent local-only lock
- ✓ Works in fully air-gapped environments
Air-Gapped Deployment
For classified, restricted, or fully offline environments.Installation in Air-Gapped Environments
Step 1: Download on internet-connected machineollama binary and ollama-models.tar.gz to air-gapped machine, then:
Network Verification
Verify that repr makes zero network calls:strace (Linux) or dtrace (macOS) to verify no network syscalls.
Compliance Requirements
HIPAA (Healthcare)
Requirements:- ✅ No PHI leaves local machine
- ✅ Audit trail of all data access
- ✅ Encryption at rest
- All network operations (should be zero in local-only mode)
- All story generation events (local only)
- Data storage locations
- Privacy settings history
SOX / PCI-DSS (Finance)
Requirements:- ✅ Code doesn’t leave secure environment
- ✅ No sensitive data in logs
- ✅ Access controls and audit trails
- File paths (replaced with relative paths)
- Email addresses (commit authors)
- API keys and secrets (if accidentally committed)
ITAR / Defense (Classified Environments)
Requirements:- ✅ Zero external network access
- ✅ Code remains on classified system
- ✅ Auditable operations
- Binary installed via approved transfer method (USB)
- No internet connectivity on target system
- Local LLM installed and verified
-
repr privacy lock-local --permanentexecuted - Network monitoring shows zero external packets
- Stories stored only in
~/.repr/(no external storage) - All operations logged for audit
GDPR (EU Data Protection)
Requirements:- ✅ User consent for data processing
- ✅ Right to be forgotten
- ✅ Data portability
- Consent: repr never uploads data without explicit user action (
repr push) - Right to be forgotten: Delete local stories with
repr story delete <id> - Data portability: Export all data with
repr data backup
Enterprise Features
Multi-User Deployment
Deploy repr for your entire engineering team: 1. Create standard configurationCentralized LLM Deployment
Run one shared Ollama instance for your team (reduces resource usage): Server setup:Single Sign-On (SSO) Integration
Coming soon: repr.dev cloud features will support SSO via:- SAML 2.0
- OAuth 2.0 (Google, GitHub, Okta)
- OpenID Connect
Security Best Practices
1. Verify Binaries
Always verify repr binary authenticity:2. Isolate repr Storage
Keep repr data separate from your code:3. Backup Regularly
repr stories are valuable. Back them up:4. Review Generated Content
Always review stories before publishing:5. Rotate API Keys
If using BYOK (Bring Your Own Key):Troubleshooting Security Issues
”Firewall blocked repr”
repr should work behind corporate firewalls if you’re using local-only mode:“Security scan flagged repr binary”
repr is open source. Your security team can:- Review source code: https://github.com/repr-app/cli
- Build from source instead of using pre-built binaries
- Run security scans on the binary
”Ollama using too much memory”
Ollama loads the entire model into RAM. For resource-constrained environments:Getting Help
Enterprise Support
For enterprise customers, we offer:- Priority support
- Custom deployment assistance
- Security questionnaire completion
- Compliance documentation
- On-site training
Security Issues
Report security vulnerabilities privately:- Email: security@repr.dev
- PGP Key: https://repr.dev/.well-known/pgp-key.txt
Community Support
For general questions:- GitHub Issues: https://github.com/repr-app/cli/issues
- Discussions: https://github.com/repr-app/cli/discussions
- Documentation: https://repr.dev/docs
Summary
repr is designed for security-conscious developers:- ✅ Local-first architecture — Zero data leaves your machine by default
- ✅ Air-gapped support — Works in fully offline environments
- ✅ Compliance-ready — HIPAA, SOX, ITAR, GDPR compliant
- ✅ Audit trail — See exactly what happened and where data went
- ✅ Open source — Full transparency, build from source if needed

