Security6 min read

Privacy-First by Design: What Vibgrate Never Collects

In an era of increasing scrutiny over developer tool data practices, Vibgrate takes a hard line: no source code, no secrets, no environment values, no git identity data. This post details exactly what the Vibgrate CLI does and does not collect — and the architectural decisions that make these guarantees enforceable.

Privacy Is Not a Feature — It Is Architecture

Most developer tools include a privacy policy that says "we take your privacy seriously." Vibgrate takes a different approach: the architecture prevents data collection, so trust is not required.

The Vibgrate CLI is built around hard guarantees about what data is never accessed, never read, and never transmitted. These are not policy decisions that could change in a future update — they are structural constraints in how the tool operates.

What Vibgrate Never Does

CategoryHard Guarantee
Source codeNever read beyond config/manifest files. Vibgrate reads package.json, tsconfig.json, .csproj, lockfiles, and similar structured manifests. It never opens .ts, .js, .cs, .py, or .java source files to read their contents.
SecretsNever scanned for, never extracted. No regular expressions for API keys. No credential detection.
Environment valuesNever read. Only .env file existence is flagged (as a security posture indicator) — the file is never opened.
Git identity dataNever accessed. git log is never invoked. Your commit history, author names, and email addresses are not scanned.
File contentsOnly structured config fields are extracted. For example, strict: true from tsconfig.json — not the content of your TypeScript files.
Network endpointsNever parsed from config files. URLs, connection strings, and API endpoints in your configuration are not read.

What Vibgrate Does Collect

To calculate drift scores and run extended scanners, Vibgrate reads:

  • Package names and version numbers from package.json, .csproj, lockfiles, and similar manifests.
  • Config structure flags (e.g., strict: true, module: "esnext") from tsconfig.json and similar configuration files.
  • File names and sizes — paths and filesystem metadata for the File Hotspots scanner. Never file contents.
  • Public registry metadata — latest versions, deprecation flags, and EOL dates from npm, NuGet, PyPI, and Maven registries.
  • CI/Docker/IaC file presence — whether files like .github/workflows, Dockerfile, terraform/ exist. Not their contents beyond structural counts.

No Data Leaves Your Machine Unless You Ask

This is the most important guarantee: no data is transmitted anywhere unless you explicitly run --push or vibgrate push.

  • By default, scans are entirely local.
  • The JSON artifact is written to .vibgrate/ on your local filesystem.
  • Registry queries go to the public npm/NuGet/PyPI/Maven APIs and contain only package names (information that is already public).
  • The dashboard upload is opt-in, authenticated by a DSN you control, and can be routed to a specific data residency region (US or EU).

The .vibgrate/ Directory

Vibgrate writes scan artifacts to .vibgrate/ inside your project directory. These files:

  • Are regenerated on every scan
  • Should be added to .gitignore
  • Should not be copied between environments
  • Can be suppressed entirely with --no-local-artifacts
# .gitignore
.vibgrate/

Why This Matters

Developer tools increasingly ask for broad access: repository tokens, cloud credentials, source code uploads. Every access point is a trust surface.

Vibgrate minimises that surface by design. The drift score is calculated from manifests and public registry data — nothing more. You do not need to grant Vibgrate access to your repository, your CI secrets, or your cloud accounts. You do not even need to create an account to use the CLI.

The Vibgrate Drift Intelligence Engine proves that powerful analysis does not require invasive access. A manifest and a registry query are enough to tell you how far behind you are and what to upgrade first.


Try it risk-free. Sign up at dash.vibgrate.com to scan your repos with a privacy-first tool that never reads your source code, secrets, or git history.

Sources & References