Security Policy

Last updated: 2026-05-05

This page describes how Uiprobe ("we", "us") protects the security of the Uiprobe service and the data it processes, and how we receive and respond to reports of security vulnerabilities. It applies to the Uiprobe web application, the Chrome extension, the Figma plugin, and the probe processing service operated by us. It does not cover third-party software you install or third-party services you connect to Uiprobe.

Data protection

In transit

All connections to Uiprobe are encrypted in transit. This includes connections from end-user browsers, the Chrome extension, the Figma plugin, and all internal traffic between Uiprobe services and our subprocessors.

At rest

Customer data is stored on infrastructure operated by our subprocessors and is encrypted at rest using the encryption mechanisms provided by those platforms.

Data minimization

Uiprobe captures only the data needed to compare a Figma design against a live webpage: design metadata fetched via the Figma API or extracted by the Figma plugin and screenshots and DOM-derived assets from the target webpage. We do not capture credentials, payment instruments, or end-user content from the target webpage beyond what is needed for visual comparison.

Authentication and access control

  • Customer authentication is handled by a third-party identity provider; Uiprobe does not store user passwords.
  • Federated identity through supported third-party providers is available. Any access tokens granted to Uiprobe are held only for the duration needed to perform the user's requested action.
  • Internal access to production systems is restricted to authorized personnel and requires multi-factor authentication.

Incident response and customer notification

If we determine that an incident has resulted in unauthorized access to or disclosure of customer data, we will notify affected customers without undue delay, in accordance with applicable law and the terms of our customer agreements. Where we act as a processor on behalf of a customer, we will notify that customer in line with our Data Processing Addendum.

Logging and monitoring

Application and infrastructure logs are retained to support incident detection and investigation. Access to logs is restricted to authorized personnel.

Compliance posture

Uiprobe is not currently independently audited against SOC 2, ISO 27001, or similar frameworks. Our subprocessors maintain their own certifications.

Changes to this policy

We may update this page from time to time. The "last updated" date below reflects the most recent change.

Contact

General security, privacy and data protection: privacy@uiprobe.io

Disclaimer

This page describes our security program at a high level for informational purposes. It does not form part of any contract and does not create any warranty, representation, or commitment beyond those in our written agreements with customers. To the extent of any conflict between this page and a written agreement, the written agreement controls.

Uiprobe

The fastest way to see how your implementation compares to the design. No screenshots, no guessing

© 2026 · Built by UIPROBE