Security

How Tiller is built to keep your servers safe.

Tiller stores SSH credentials. We take that seriously. This page covers how we protect them — and what we ask of you to protect your account.

How credentials are stored

Every SSH credential — password or private key — is encrypted with AES-256-GCM using a key held in the Tiller server's environment file, separate from the database. Even a full database leak doesn't reveal credentials without the key.

How sessions work

How the network is protected

What about the AI?

AI tools (Claude Code, Aider, Gemini, Ollama) run on your server, talk to their vendor (Anthropic, OpenAI, etc.), and never route through Tiller. Tiller can see what you see in the terminal, but doesn't intercept or store what the AI says back to you. If you're concerned about an AI vendor's data handling, that's a question for them, not us.

Reporting a vulnerability

If you discover a security issue in Tiller, please email security@tiller.run directly. Do not file a public issue. We aim to acknowledge reports within 48 hours and ship fixes for critical issues within 72 hours. We're a small team but we treat this seriously.

What we ask of you


Tiller is in private beta. A formal SOC 2 / ISO 27001 readiness package is on the public-launch roadmap.