Your code is safe with us.

In order to understand your code, we need to read it. We do not store your code. Everything is deleted as soon as we are done with our task.

We are fully SOC2 Type II compliant.

Squire is proud to have successfully completed the System and Organization Controls (SOC) 2 Type I and Type II examinations in recognition of our commitment to information security.

All traffic is encrypted.

All of our traffic, in and out of Squire is encrypted. That means no one can hijack a transaction or a message and save it for themselves. We also host all of our infrastructure in the same place to avoid external dependencies.

All US/EAST based infrastructure.

We host all of our servers, databases, and other services within the same region/datacenter to avoid external access.

Threat detection, DDoS protection.

With the help of our partners at Cloudflare, we are protected from DDoS attacks and other threats. You never know when someone wants to show up at the party without an invitation.

Frequently Asked Questions

Will Squire use my code to train or improve services?

How does Squire work?

When does Squire generate code or a PR?

Does Squire commit directly to my source code?