| sidebar_position | 5 |
|---|---|
| title | Security |
This page explains what Postlane can and cannot access, what data stays on your machine, and what is sent to external services.
Postlane reads the Git history of repositories you explicitly add to the app. It reads the .postlane/ directory in each repo for configuration and voice guides. It writes drafts and post metadata to .postlane/posts/ within each repo.
Postlane does not read anything outside the repositories you add. It has no access to your file system beyond those paths, no access to your browser, and no access to your email or contacts.
The following never leaves your machine:
- Your repository file system and Git history
- All post drafts and published post metadata (
meta.json) - Your
.postlane/configuration directory - All API keys and tokens (stored in the OS keyring -- see Credentials)
When you approve and send a post, the post content is sent to your connected scheduling provider (Zernio, Buffer, Ayrshare, Publer, Outstand, or a webhook URL). Postlane passes the content and a scheduled time -- your social platform credentials never leave your scheduling provider's account.
If you use the Postlane tracking snippet (p.js) on your site, page-view events are sent to Postlane's analytics backend when a visitor arrives via a Postlane post link. This data belongs to your account and is not shared. See Analytics for the full privacy model.
Postlane communicates with postlane.dev for the following purposes:
- License validation -- the desktop app sends your license token to verify your account is active. This happens at startup and periodically in the background.
- Analytics events -- if you opt in to product telemetry during onboarding, the desktop app sends anonymous usage events (for example, "post approved" or "provider configured"). No post content is included. You can opt out at any time in Settings → Account → Product telemetry.
Postlane does not sell data to third parties and does not use your post content to train models.
When Postlane fetches a URL -- for example, to generate an Open Graph image preview -- it validates the URL before making the request. Requests to private network ranges are blocked:
127.x.x.x(loopback)10.x.x.x172.16.x.xthrough172.31.x.x192.168.x.x169.254.x.x(link-local)- IPv6 private ranges (
fd00::/8)
Only https:// URLs are accepted. http:// and bare IP addresses are rejected.
The current release of Postlane is not yet code-signed. On macOS, Gatekeeper will show a security warning when you first open the app -- follow the Unsigned app bypass steps in the Installation guide. On Windows, SmartScreen may show a warning; click More info, then Run anyway to proceed.
Code signing is planned for a future release.
If you find a security vulnerability in Postlane, please report it privately:
- Email: security@postlane.dev
- GitHub: open a private security advisory at
github.com/postlane/desktop/security/advisories
Do not open a public GitHub issue for security reports. We aim to respond within 48 hours and will coordinate a disclosure timeline with you.