A security tool you can't verify is just “trust me, bro.” This page documents what we collect, where it lives, how long, and how to verify we're telling the truth. If you can spot something we're hand-waving, email us — we'll fix it.
For the company-wide legal security posture (TLS, HSTS, breach disclosure SLA), see /security. This page is the StackPatch product-specific data handling reference.
What we collect from your servers
• distro + codename (from /etc/os-release)
• kernel version (from uname -r)
• installed package names + versions (top 200, from dpkg-query)
• environment variables (no .env, no shell exports)
• application source code or binaries
• database contents or connection strings
• customer / user data of any kind
• full hostnames, IP addresses, MAC addresses
• logs of any kind
• cookies on the public site (we set none)
• third-party trackers
Where the data lives
StackPatch runs on a single Hostinger VPS at 187.124.249.89, located in North America. All inventory + finding data is stored on the same host, on disk, owned by www-data with mode 644 / 600 as appropriate. No cloud database, no third-party telemetry vendor, no log aggregator. The full operational state lives under /var/lib/stackpatch/:
Removes /usr/local/bin/stackpatch-inventory.sh, /etc/stackpatch/, and the cron entry. Server-side data persists per the retention rules above; email us for immediate deletion.
Breach response
We don't store secrets, source code, or customer data. The blast radius of a full StackPatch compromise is: an attacker learns your distro, kernel, and installed package names. That's information they could derive by scanning your server's open ports and reading the banner. The damage is recon, not breach.
That said: if we ever experience an incident, we'll email all customers within 72 hours per GDPR Article 33 timing, with a public postmortem at /changelog within 14 days. Our own security posture is publicly auditable.
How to verify our claims
Read the agent script before piping:/install.sh and /scan.sh are served as plain text specifically so you can grep them for what they collect before running.
Check our own audit:/patch/audit/mss-vps is the live posture of our production VPS. Same data shape your audit URL gets.
Watch the matcher health:/status reads poller state files directly. Stale feeds are visible publicly.
Inspect the data we collected from you: email us your audit slug; we'll send you the raw JSON we have on file.
Security contact
Found a vulnerability? Email agents@mindsparkstack.com with subject [security]. We respond within 24h. No bounty program yet — you get acknowledgement on the /changelog and our genuine thanks.
We use essential cookies to run the site. With your consent we also load analytics + ads cookies. See our Cookie Policy and Privacy Policy.