Security at Drive Shadow
Your data security and privacy are our top priorities. Learn how we protect your files and information.
Core Security Principles
Zero File Storage
We never store your files. Drive Shadow creates temporary access links to your Google Drive files without copying or storing file content on our servers.
Data Privacy
Your files remain in your Google Drive. We only access metadata needed to generate secure links and track analytics you've authorized.
Encrypted Connections
All API communications use TLS 1.3 encryption. We enforce HTTPS for all connections to protect data in transit.
OAuth 2.0
We use Google's OAuth 2.0 for authentication. You can revoke Drive Shadow's access anytime from your Google account settings.
How We Protect Your Data
Minimal Permissions
Drive Shadow only requests the minimum Google Drive permissions needed to function. We never ask for more access than necessary and you maintain full control over your files.
Automatic Expiry
All generated links support automatic expiry. Set custom expiration times (from 1 minute to unlimited) to ensure files are only accessible for as long as needed.
API Key Security
API keys are hashed and encrypted at rest. Never expose your API keys in client-side code or public repositories. Revoke and regenerate keys instantly from your dashboard.
Secure Infrastructure
Our infrastructure is hosted on trusted cloud providers with enterprise-grade security. We implement regular security audits, automated backups, and DDoS protection.
Activity Monitoring
Track all API activity through your dashboard. View detailed logs of link generation, access patterns, and usage analytics to monitor for unusual activity.
Compliance & Standards
GDPR Compliant
We follow GDPR guidelines for data protection and give you full control over your data with rights to access, modify, and delete.
Data Processing Agreement
Enterprise customers can request a Data Processing Agreement (DPA) to ensure compliance with data protection regulations.
Regular Security Audits
We conduct regular internal security audits and penetration testing to identify and fix vulnerabilities proactively.
99.9% Uptime SLA
Paid plans include a 99.9% uptime Service Level Agreement with real-time status monitoring at driveshadow.com/status.
Security Best Practices
Recommendations for Users
- •Keep API keys secret: Never commit API keys to GitHub or expose them in client-side code
- •Use environment variables: Store API keys in environment variables or secure key management systems
- •Set appropriate expiry times: Configure link expiration based on your use case to minimize exposure
- •Monitor API usage: Regularly check your dashboard for unusual activity or unexpected usage patterns
- •Rotate API keys: Periodically regenerate API keys, especially after team member changes
- •Use HTTPS only: Always make API requests over HTTPS to ensure encrypted communication
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Email: security@driveshadow.com
Response Time: We aim to respond within 24-48 hours
Scope: Include detailed steps to reproduce, potential impact, and any relevant logs or screenshots
Please do not: Publicly disclose the vulnerability before we've had a chance to address it. We appreciate responsible disclosure and will acknowledge your contribution.
Have Security Questions?
Our security team is here to address any concerns about data protection and privacy.
Contact Security Team