Security Policy

Last Updated: February 15, 2026

At SAT-CHAIN LLC, security is fundamental to LISA Core. This document outlines our security practices, architecture, and your responsibilities when using our Service.

Key Security Principle: The LISA Core Chrome Extension processes ALL conversation compression 100% locally in your browser. Your conversation data never leaves your device unless you explicitly choose to sync with the Web Application.

1. Architecture Overview

LISA Core is designed with a privacy-first architecture that minimizes data exposure:

2. Chrome Extension Security

2.1 Local Processing

2.2 Permissions

LISA Core requests only the minimum permissions necessary to function:

We do not request permissions for browsing history, bookmarks, or access to all websites.

2.3 Code Integrity

2.4 Supported Platforms

LISA Core only activates on specific AI platform domains:

3. Web Application Security

3.1 Data Transmission

3.2 Data Storage

3.3 Payment Security

4. Cryptographic Security

4.1 LISA Hash

Our cryptographic verification system provides data integrity assurance:

4.2 Hash Chain Integrity

4.3 Code Provenance

For code snippets within conversations, LISA Core can generate provenance hashes that cryptographically link code to its conversation context, enabling verification of code origin.

5. Data Handling Practices

5.1 Data We Never Access

5.2 Data We May Access (When You Sync)

5.3 Data Retention

6. Your Security Responsibilities

To maintain the security of your data, you should:

7. Incident Response

In the event of a security incident affecting user data:

  1. We will investigate promptly and thoroughly
  2. Affected users will be notified within 72 hours of confirmed breach
  3. We will provide clear information about what data was affected
  4. We will provide guidance on remediation steps
  5. We will implement measures to prevent recurrence
  6. We will cooperate with relevant authorities as required by law

8. Vulnerability Reporting

We appreciate the security research community's efforts to improve our security. If you discover a security vulnerability:

We commit to acknowledging receipt within 48 hours and providing regular updates on our progress.

9. Compliance

LISA Core is designed with privacy and security best practices:

10. Updates to This Policy

We may update this Security Policy periodically to reflect changes in our practices or for legal, operational, or regulatory reasons. Significant changes will be communicated via the Website or extension update notes.

11. Contact

For security questions, concerns, or vulnerability reports:

← Return to LISA Core