Skip to main content

Documentation Index

Fetch the complete documentation index at: https://help.slashy.com/llms.txt

Use this file to discover all available pages before exploring further.

Slashy handles your email, calendar, and contacts. Security is the foundation, not a feature.
Slashy security overview showing SOC 2, encryption, and privacy certifications

Certifications

CertificationStatus
SOC 2 Type IIAudited annually
CASA Tier 2Google Cloud Application Security Assessment — passed
Penetration TestingQuarterly, independent third-party firm
EncryptionAES-256 at rest, TLS 1.2+ in transit
Full compliance docs: slashy.com/security

AI and Your Data

Does the AI train on my emails? No. Every AI provider is contractually bound to a zero-training agreement. Your data is processed to generate a response and then discarded.
AI ProviderUsed ForTrains on Your Data?
Anthropic (Claude)Drafts, agent, automationsNo — contractually prohibited
OpenAIDrafts, editing, autocompleteNo — contractually prohibited
Google (Gemini)Categorization, searchNo — contractually prohibited
GroqFast inference tasksNo — contractually prohibited
Only the minimum necessary context (email thread, memories, calendar if relevant) is sent to providers.

Prompt Injection Protection

Malicious emails can contain hidden instructions to trick AI assistants. Slashy sanitizes and isolates incoming email content from system instructions before it reaches any model. The agent cannot take unauthorized actions and flags suspicious content.

What Data Slashy Stores

  • Email metadata and content — cached for fast access
  • Calendar events — synced from Google Calendar
  • Agent conversations — your AI sidebar chat history
  • Memories — preferences, contacts, writing style
  • Automation logs — what ran and when
  • Usage analytics — anonymous, via PostHog
All stored data: AES-256 at rest, TLS 1.2+ in transit.

OAuth Access Model

  • Slashy never sees or stores your Google password
  • You grant specific permissions you can revoke anytime at myaccount.google.com/permissions
  • OAuth tokens stored encrypted, refreshed automatically
  • Same model applies to optional integrations (Zoom, Granola)

Data Deletion Timeline

StepTimingWhat Happens
Revoke accessImmediateOAuth tokens invalidated. No more email/calendar access.
Hard deleteWithin 24 hoursAll data permanently deleted from production.
Backup purgeWithin 7 daysData removed from encrypted backups.
Delete your account from Settings > Account or email founders@slashy.com.

Trust at a Glance

SOC 2 Type II

Audited annually by an independent firm

Zero-Training Guarantee

No AI provider trains on your data

AES-256 Encryption

Data encrypted at rest and in transit

Common Security Questions

Encrypted servers in the United States, hosted on AWS with SOC 2 compliance. All data encrypted with AES-256 at rest and TLS 1.2+ in transit.
No. Employee access to production data is restricted, logged, and auditable. No one reads your email unless you explicitly share it for debugging.
Yes. Visit slashy.com/security to request the full report, pen test summary, and compliance documents.
Yes. Email founders@slashy.com with details. We respond within 24 hours.
Yes. Slashy is built for professionals handling sensitive email. SOC 2 Type II audited, quarterly pen-tested, and all AI providers contractually prohibited from training on your data. Many VC firms, startups, and enterprise teams use Slashy for confidential communications.
Slashy maintains an incident response plan tested quarterly. In the event of a breach, affected users are notified within 72 hours per GDPR requirements. Encrypted data at rest means raw email content is not exposed even if infrastructure is compromised.
Yes. Slashy uses standard Google OAuth 2.0 with scoped permissions. Your Workspace admin can approve Slashy as a trusted app and control which users can connect. See Connecting Gmail for permission details.

AI Privacy

How AI providers handle your data

Data Storage

What Slashy stores and your controls

Connecting Gmail

OAuth permissions and what Slashy accesses

Subprocessors

Full list of infrastructure providers