Trust Export

Print-friendly bundle for PDF export and procurement sharing.

This page aggregates an executive summary of privacy, terms, security, subprocessors and changelog to simplify browser-based PDF export.

Last updated: 2026-04-13Last reviewed by: Security, Privacy and Operations

Privacy summary

  • We collect account, billing and technical usage data required to authenticate users, operate the service and investigate incidents.
  • Diagnostic data may include session metadata, runtime events, release information, application manifests and artifacts submitted by the SDK.
  • Customers remain responsible for the content they choose to send to the service and should avoid submitting unnecessary or prohibited data under their own internal policies.
  • We do not sell personal data and limit sharing to subprocessors and providers required for service delivery, communications and billing.
  • Maintain an audit trail for administrative actions and tenant-sensitive events.
  • Apply plan-based retention and support tenant-level export and deletion operations.
  • Respond to formal privacy requests within the operational workflow agreed with each customer.
  • Update subprocessors and public trust materials when the operating architecture changes in a material way.

Terms summary

Service scope

MFE Debugger provides instrumentation, ingestion, incident correlation, billing and an administrative console for operating micro-frontend architectures.

Acceptable use

Customers must not use the service for unlawful activity, unauthorized data submission, abusive load testing, attempts to bypass commercial limits or improper credential use.

Customer responsibilities

Customers are responsible for configuring environments, credentials, domains, billing and SDK payloads in line with their legal obligations, contracts and internal policies.

Availability and support

Service operations depend on infrastructure, subprocessors and external connectivity. Support follows the operating queue and may include dedicated workflows for enterprise customers.

Suspension and termination

Accounts may be suspended for non-payment, abuse, security risk, material breach of these terms or any use that threatens the service for other customers.

Order of precedence

For enterprise agreements, order forms, DPAs, technical exhibits and specific addenda may complement or supersede these initial public terms.

Security summary

  • Authentication with per-device sessions, session rotation and audit trail.
  • SSO, MFA, managed domains and SCIM controls according to plan maturity.
  • API keys scoped by organization or project, with revocation and usage history.
  • Persistent ingestion queue and a dedicated worker for session and incident materialization.
  • Operational playbooks for backup, restore, deployment and incident response.
  • Security reports are triaged through the primary operational channel and routed to technical investigation.
  • When material impact is confirmed, the case enters the incident workflow with audit trail, containment, remediation and communication.
  • Enterprise customers may require specific response flows and notification timelines by contract.

Subprocessors summary

Neonmanaged PostgreSQL database, operational storage and pooled production connections
Sentryerror monitoring, traces, technical alerts and runtime failure investigation
Stripebilling, checkout, customer portal and subscription webhooks
Customer or operator SMTP providertransactional email such as verification, recovery and alerts
Application hosting and PostgreSQLproduct execution, operational persistence and queues

Document changelog

2026-04-17 - Status, support and privacy operations shipped

Public status, support entry points and export/deletion operations with grace period were connected to the operating flow.

2026-04-17 - Real subprocessors updated

Neon and Sentry were added as operational subprocessors for managed database and observability.

2026-04-13 - Initial trust package published

Public privacy, terms and security pages were added together with a global trust footer.

2026-04-13 - Subprocessors and disclosure published

The initial public subprocessors list, disclosure page and security.txt route are now available.

2026-04-13 - Procurement materials expanded

The base DPA, vendor questionnaire, privacy ops and response templates were structured for due diligence.

MFE Debugger
MFE Debugger

Artefatos de confiança operacional, segurança e privacidade.

Privacidade, termos, seguranca publica, subprocessadores e materiais operacionais ficam centralizados para acelerar avaliacao tecnica, juridica e comercial.

Iniciar trialAbrir trust center
Last updated: 2026-04-13Support: support@mfe-debugger.localSecurity: support@mfe-debugger.localPrivacy: support@mfe-debugger.local
Produto
HomeSDKIniciar trial
Trust
Trust CenterTrust Center ENPrivacidadeTermosSegurancaSubprocessadoresDisclosure
Contato
Support: support@mfe-debugger.localSecurity: support@mfe-debugger.localPrivacy: support@mfe-debugger.local