Documentation Index
Fetch the complete documentation index at: https://docs.repixa.io/llms.txt
Use this file to discover all available pages before exploring further.
Security Overview
Security is built into Repixa’s core architecture. Every demo runs in an isolated environment with strict access controls.Key security principles
Environment isolation
Each demo session runs in a fully isolated sandbox. Sessions cannot access other sessions or your production environment.
UI action restrictions
Laura can only interact with URLs and elements you explicitly allow. Billing pages, settings, and admin areas are blocked by default.
No credential storage
Repixa never stores your product’s login credentials. Demo environments use token-based or SSO access.
Data minimization
Only demo-relevant prospect data is captured. No PII beyond what the prospect voluntarily shares.
Data handling
| Data type | Stored | Retention | Shared |
|---|---|---|---|
| Demo session recordings | Yes | 90 days (configurable) | You only |
| Prospect contact info | Yes | Until deleted | CRM (if connected) |
| Knowledge base content | Yes | Until deleted | Laura only |
| Product credentials | No | Never | Never |
Compliance
Repixa is actively pursuing enterprise compliance certifications. Current status:- SOC 2 Type II — In progress
- GDPR — Compliant (data processing agreements available)
- CCPA — Compliant
