Security Overview
Sorty is designed with security and privacy as core principles. All sensitive data is encrypted, file operations are sandboxed, and you have full control over what data is shared with AI providers.Supported Versions
Security updates are provided for the following versions:| Version | Supported |
|---|---|
| 1.0.x | ✓ Yes |
| < 1.0 | ✗ No |
Sandboxing & Permissions
Sorty runs within the macOS App Sandbox with these entitlements:- User-selected file access (read/write)
- Network access for AI provider APIs
- No system-level access outside the sandbox
The app cannot access files or folders you haven’t explicitly granted permission to. Watched folders require security bookmarks to maintain access across sessions.
Data Security
Local Data Protection
| Data Type | Encryption | Biometric Protection |
|---|---|---|
| The Learnings Profile | AES-256 | Touch ID/Face ID required |
| Organization History | None (file paths & metadata) | No |
| Settings | None (UserDefaults) | No |
| API Keys | macOS Keychain | System-level |
Why is The Learnings Profile encrypted?
Why is The Learnings Profile encrypted?
The Learnings Profile contains your personal organization preferences, file path patterns, and behavioral data. This sensitive information is encrypted with AES-256 and protected by biometric authentication to prevent unauthorized access—even if someone gains physical access to your Mac.
What Data Gets Sent to AI Providers?
When using cloud-based AI providers (OpenAI, Anthropic, Groq, etc.):Always Sent
- File names
- File metadata (size, type, modified date)
- Directory structure
Never Sent
- File contents (unless Deep Scan is enabled)
- Your API keys
- Organization history
- Personal settings
Privacy-First AI Options
For maximum privacy, use local AI processing:- Ollama
- Apple Intelligence
Processes files entirely on your machine. No data leaves your computer.Configure in Settings → AI Provider → Ollama (
localhost:11434).Network Security
- All API calls use HTTPS with TLS 1.2+
- API keys are never logged or transmitted outside AI provider endpoints
- Update checks fetch version data from GitHub Releases API over HTTPS
- No telemetry or analytics data is collected
What network connections does Sorty make?
What network connections does Sorty make?
- AI Provider APIs: Only when you trigger organization or use AI features
- GitHub Releases API: For update checks (once per 24 hours, or manually)
- No other connections: No tracking, no analytics, no third-party services
Supply Chain Security
- Dependencies are pinned in
Package.resolved - GitHub Actions workflows scan for secrets using Gitleaks
- Automated security checks run on every commit
- Build artifacts are reproducible from source
Security Best Practices
Protecting Your Data
Use Local AI When Possible
Ollama keeps all processing on your device. Apple Foundation Models require macOS 15+.
Secure Your API Keys
- Store keys in the macOS Keychain, not in plain text
- Use environment variables for CLI tools
- Rotate keys periodically
- Never commit keys to version control
Review Deep Scan Settings
Deep Scan uploads file content excerpts. Only enable for files you are comfortable analyzing remotely. Disable for sensitive documents.
Monitor Watched Folders
Watched folders have persistent file system access. Remove folders you no longer want monitored. Review permissions periodically.
Privacy Mode
Privacy Mode is enabled by default and provides visual protection for sensitive information:- Blurs sensitive handles (file paths, API URLs) until hover
- Hides API keys with a manual reveal toggle
- Redacts learning profile data in screenshots
Reporting Security Vulnerabilities
Reporting Process
- Use GitHub’s private vulnerability reporting
- Include steps to reproduce, if possible
- Allow up to 48 hours for acknowledgment
- We will provide an estimated timeline for the fix
What to Report
Report if you notice:- Unexpected network connections
- Files being accessed without your action
- Unusual API usage patterns
- Potential data leaks
- Authentication bypass
- Encryption vulnerabilities
Incident Response
In the event of a security incident:- Reports are acknowledged within 48 hours
- Affected users are notified via GitHub releases and the in-app update system
- Fixes are prioritized based on severity
- Post-incident reports are published for transparency
- CVE identifiers are requested when applicable
Security-Related Configuration
Disabling Network Features
To minimize network exposure:Verifying Releases
While releases are not signed, you can verify integrity:Third-Party Security
Sorty integrates with third-party services. Review their security policies:OpenAI
Enterprise-grade security
Anthropic
SOC 2 Type II certified
Groq
Infrastructure security
Contact
- Security Issues: Use GitHub’s private vulnerability reporting
- General Questions: Open a GitHub discussion (not for vulnerabilities)
Last updated: January 2026