Data Handling
- Session data: Stored locally in SQLite using better-sqlite3
- Workspace configuration: Stored at
~/.purple-code/ - Code context: Sent to Anthropic’s Claude API for AI processing
- No server storage: No code is stored on Purple’s servers beyond what’s needed for the API call
Credential storage
Authentication tokens are encrypted using your operating system’s keychain:- macOS — Keychain
- Windows — DPAPI (Data Protection API)
- Linux — Secret Service
~/.config/p0/purple-auth.dat. If OS-level encryption is unavailable, a fallback unencrypted file is used.
Encryption
All API communication between p0 and Purple’s services uses HTTPS/TLS encryption to protect data in transit.Environment Security
Terminal sessions use an allowlist-based environment filter. Only safe variables (PATH, HOME, etc.) are passed to terminal processes. App secrets and sensitive environment variables are never exposed to terminal sessions, protecting your credentials and API keys.Analytics
p0 uses PostHog for anonymous usage analytics to help improve the product. Analytics data includes:- Feature usage patterns
- Performance metrics
- Error rates
Error Tracking
p0 includes optional Sentry integration for crash reporting. This helps Purple identify and fix bugs quickly. Error reports may include:- Stack traces
- App state at time of error
- Device information (OS version, app version)
Telemetry Opt-Out
To disable analytics tracking:- Open Settings (
Cmd+,orCtrl+,) - Go to Preferences
- Enable “Analytics opt-out”
For questions about privacy or data handling, contact [email protected].