Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.repixa.io/llms.txt

Use this file to discover all available pages before exploring further.

Security Overview

Security is built into Repixa’s core architecture. Every demo runs in an isolated environment with strict access controls.

Key security principles

Environment isolation

Each demo session runs in a fully isolated sandbox. Sessions cannot access other sessions or your production environment.

UI action restrictions

Laura can only interact with URLs and elements you explicitly allow. Billing pages, settings, and admin areas are blocked by default.

No credential storage

Repixa never stores your product’s login credentials. Demo environments use token-based or SSO access.

Data minimization

Only demo-relevant prospect data is captured. No PII beyond what the prospect voluntarily shares.

Data handling

Data typeStoredRetentionShared
Demo session recordingsYes90 days (configurable)You only
Prospect contact infoYesUntil deletedCRM (if connected)
Knowledge base contentYesUntil deletedLaura only
Product credentialsNoNeverNever

Compliance

Repixa is actively pursuing enterprise compliance certifications. Current status:
  • SOC 2 Type II — In progress
  • GDPR — Compliant (data processing agreements available)
  • CCPA — Compliant
For enterprise compliance documentation or DPAs, contact us.

Responsible disclosure

If you discover a security vulnerability, please report it to security@repixa.io. We aim to respond within 48 hours.