Transparency first

Privacy & Data Policy

Effective April 4, 2026 · Last updated April 4, 2026

1. Overview

Klyro ("we", "us", "our") is a managed WordPress and web-application hosting platform operated by Capax Labs. This policy explains what data we collect, why we collect it, how we protect it, and your rights as a user.

2. Data We Collect

2.1 Account Data

FieldSourcePurpose
Email addressGoogle OAuthAccount identification, login
Display nameGoogle profileDisplayed in UI and audit logs
Profile picture URLGoogle profileAvatar in the dashboard
OAuth provider IDGoogle OAuthSingle-sign-on link
We do not store your Google password. Authentication is handled entirely through Google's OAuth 2.0 flow.

2.2 Security & Authentication Data

FieldPurpose
SSH public keysSecure shell access to site environments
2FA (TOTP) secretTwo-factor verification (stored hashed, never exposed via API)
JWT access & refresh tokensStateless API session management

2.3 Site & Infrastructure Data

When you create and manage sites, we store:

  • Site configuration — name, subdomain, tier, resource allocations, runtime versions, datacenter region
  • Domain records — custom domains, SSL certificate status
  • SFTP & database credentials — generated per-site, stored encrypted, never exposed in API responses
  • Integration tokens (optional) — Telegram, Slack, Discord — used exclusively for notifications you configure
  • Backup metadata — type, status, size, expiration; backup data stored in encrypted object storage

2.4 AI Agent Data

If you use Klyro's AI agents:

  • Agent configuration — name, role, system prompt, heartbeat schedule
  • Task & message history — titles, descriptions, priority, status, and agent-to-user messages
  • Agent activity logs — timestamped records for debugging and traceability

2.5 Audit & Activity Logs

Every significant action on the platform generates an immutable audit event containing:

FieldExample
Action performedsite.create, domain.add, backup.restore
Actor identityEmail, actor type (user/agent/system)
IP addressClient IP at time of action
User agentBrowser/client identifier
Resource affectedType, ID, and name
OutcomeSuccess, failure, or error with HTTP status
Audit events are append-only and SHA-256 hash-chained. Any modification to a historical record will break the chain and be detectable.

2.6 File Activity Logs

SFTP and file-management operations are logged with: action type (upload, download, delete, rename), file path, file name, file size, acting user, and timestamp.

2.7 Data We Do NOT Collect

No third-party analytics

No Google Analytics, Mixpanel, Hotjar, or tracking SDKs

No cookies

Auth uses JWT bearer tokens via HTTP headers

No advertising data

We don't run ads or build advertising profiles

No site visitor tracking

We never log or analyze traffic to your hosted sites

3. How We Use Your Data

PurposeData Used
Account managementEmail, name, avatar
AuthenticationOAuth credentials, JWT tokens, 2FA secrets
Site operationsSite config, credentials, server assignments
Security & complianceAudit logs, IP addresses, user agents
Agent automationAgent config, task history, activity logs
Notifications (opt-in)Integration tokens for Telegram/Slack/Discord

4. Data Storage & Security

Infrastructure

  • Hetzner Cloud (EU — Germany)
  • MySQL with TLS-encrypted connections
  • SFTPGo with per-site credential isolation
  • Backups encrypted at rest

Access Controls

  • Sensitive fields excluded from all API responses
  • JWT tokens signed with HMAC-SHA256
  • SSH keys stored as public keys only
  • Per-site credential isolation

5. Data Sharing & Third Parties

Third PartyData SharedPurpose
GoogleEmail + profile (initiated by you)Authentication only
Hetzner CloudServer/VM metadataInfrastructure hosting
AI model providersAgent prompts and task contextAI agent execution

We do not sell your data, share it with advertisers, provide it to data brokers, or share audit logs outside your team.

6. Data Retention

Data TypeRetention
Account dataUntil you delete your account
Audit eventsImmutable — retained permanently for compliance
File activity logsRetained for the lifetime of the associated site
Site data & credentialsDeleted when you terminate a site
BackupsAuto-expire based on your plan's backup window
JWT tokensIn-memory only, expire per configured window

7. Your Rights

1

Access

View all personal data we hold via your dashboard and API

2

Rectification

Update your name and profile information via Settings

3

Deletion

Request account deletion — your user record will be soft-deleted and all sites terminated. Audit logs are immutable and will not be deleted.

4

Data portability

Export your site data via SFTP or backup download at any time

5

Restrict processing

Contact us to restrict specific processing activities

8. Children's Privacy

Klyro is not directed to individuals under the age of 18. We do not knowingly collect personal data from children. If we discover that we have collected data from a child, we will delete it promptly.

9. Changes to This Policy

We may update this policy periodically. Material changes will be announced via the Klyro dashboard and email. The "Last Updated" date at the top will always reflect the most recent revision.

10. Contact

For privacy-related inquiries, data access requests, or to report a concern:

privacy@useklyro.com

Capax Labs

Audit trail integrity

You can verify the integrity of your audit trail at any time from the Activity Logs page. Each event displays its SHA-256 checksum and link to the previous event in the chain.