Security

The smallest data footprint we can ship.

Vibes is built around a privacy thesis — and that thesis only holds if the security work is real. Here's what we do, with enough specificity that an actual security person can hold us to it.

Last reviewed · April 30, 2026

What we do

Five things we actually do.


What we don't store

A list of deliberate absences.


If something goes wrong

Disclosure. Within 72 hours.

If we discover a security incident affecting user data, we commit to disclosing it within 72 hours via a banner on this site, an in-app notice, and a direct email to anyone whose data was implicated. We will publish a written postmortem describing what happened, what data was affected, and what we changed. No corporate-comms theater.

If you've found a vulnerability, please email security@vibes.app. We don't run a bounty program yet but we'll send you a real thank-you, credit you in the changelog if you want, and treat the report as the gift that it is.


Audits

Soon. Not yet.

As of April 2026, Vibes hasn't been formally audited by a third party. That'll change once we're past TestFlight; we'll publish the report here when it does. Until then, every claim on this page is verifiable from the iOS binary plus the published privacy policy, and any security researcher who wants to poke at the app should treat themselves as authorized to do so under standard safe-harbor terms.

Get the app    Report a vulnerability