Skip to main content

Data Privacy

Privacy Friendly

Built with privacy in mind with no third-party cookies, fingerprinting, or invasive tracking.
Our SDK explicitly does not collect:
  • IP addresses (country is derived from timezone, not IP geolocation)
  • Device fingerprints (no Canvas, WebGL, or storage-based fingerprinting)
  • Social profiles (no Twitter, Discord, or email collection)
  • Third-party cookies
Learn more about what data we collect in our Data Collection documentation.

Transparency

Open Source

Formo SDKs are 100% open source with a fully permissive MIT license.

Compliance

SOC 2 (in progress)

Formo’s SOC 2 compliance report will be available on request.

Supply Chain Security

SDK Dependencies List

The @formo/analytics SDK maintains a minimal dependency footprint to minimize attack surface:
PackagePurposeRisk Level
ethereum-cryptographyCryptographic operations (Keccak256, SHA256)Low - Audited pure JS library containing all Ethereum-related cryptographic primitives by the Ethereum Foundation
mipdEIP-6963 wallet discoveryLow - standard EIP-6963 implementation by the wevm team, authors of wagmi
fetch-retryHTTP retry with exponential backoffLow - simple utility
All releases include cryptographic provenance attestations linking each npm package to its GitHub source code.

Secure Installation Methods

There are two ways to install the Formo SDK, each with different security properties:
MethodMITM ProtectionSupply Chain Verification
NPM package (npm install @formo/analytics)Script is bundled into your own assets - no third-party script loading at runtimenpm integrity checks (SHA-512) + provenance attestations verify the package came from GitHub
CDN script tagEnable SRI + CSP for cryptographic verificationSRI hash verifies the script before browser execution
For security-sensitive deployments, we recommend the NPM package install. When you install via npm install @formo/analytics and bundle the SDK into your own application, there is no third-party script loaded at runtime - eliminating the MITM vector entirely. The code is verified by npm’s integrity checks during install and served from your own domain.
For the CDN script tag method, enable SRI and CSP for equivalent protection. See the complete secure installation guide.

Infrastructure Security

Encryption in Transit

All connections secured with industry-standard TLS 1.2+ encryption.

Encryption at Rest

All data volumes, including backups, are encrypted at rest with unique AES-256 keys.

Backups

All customer databases are continuously backed up to highly durable storage.

Data Center Security

Formo runs on AWS, which have the highest levels of security and reliability.

Monitoring

24/7 on-call rotations with internal escalations monitor across all systems.

Software Security

Quality Assurance

Automated tests and code reviews run after each code change as part of QA.

Security Reviews

Engineering review for security best practices to address potential security threats.

Vulnerability Management

Formo conducts regular penetration tests in addition to internal security reviews.

Partner Security

Access Control

Others

Changelog

Formo publishes a weekly summary of updates and fixes.

Contact

If you have any questions, contact us.