Security Overview
Last Updated: March 25, 2026
This overview explains ScriZen’s general security model at a high level. It is intended to be read together with the Privacy Policy, Terms of Service, End User License Agreement, and applicable support documentation.
ScriZen desktop applications are designed with a strict local-first operating model. Core analytical work is intended to run on your machine rather than by sending your projects to a remote cloud editor as part of normal use.
1. Local-First Architecture & Threat Model
Our primary security objective is to reduce unnecessary exposure of page analysis work, draft content, project context, and exported outputs. ScriZen is not designed as a remote cloud editor for routine analytical workflows.
Core analytical workflows are intended to run locally on your device. This includes the page-level analysis you perform, the project state created during that work, and the outputs you choose to save or export.
Because your working data generally remains on your device, you retain primary control over it. You also remain responsible for the security of your workstation, operating system, local storage, backups, user accounts, and internal network environment.
2. License Validation & Limited Network Activity
To protect product licensing and reduce unauthorized use, ScriZen software may require periodic internet connectivity.
| Validation frequency | The application checks license validity at launch and may perform a lightweight background validation approximately once every 24 hours while in use. |
| Purpose | To confirm that the license is active, valid, and permitted for use on the current device. |
| Offline grace period | If the validation service cannot be reached, ScriZen provides a temporary grace period of approximately three days to reduce disruption caused by short-term connectivity issues. |
| Implementation details | We aim to be transparent about the purpose of network checks but do not publish technical details that could weaken abuse-prevention measures. |
3. Telemetry, Diagnostics & Local Data Storage
ScriZen may store configuration files, logs, cache data, and exported outputs in standard per-user application folders on your system. These files are part of normal desktop operation and may assist with diagnostics, troubleshooting, product stability, and future product improvement.
Exact file paths can vary by platform, version, and build. Where appropriate, support documentation may provide more specific guidance for troubleshooting.
Although the product is designed around local processing, limited operational data may still be processed in connection with licensing, updates, support, website analytics, or optional diagnostics, where available. For a fuller explanation of website data, cookies, and app-related processing, please refer to the Privacy Policy.
4. Safe Downloads, Updates & Windows SmartScreen
Always download installers, updates, and release announcements directly from scrizen.com or official ScriZen communications. Avoid third-party file mirrors, repackaged software sites, and unofficial community uploads.
Because ScriZen may distribute new Windows desktop applications, Microsoft Defender SmartScreen can display a warning even when a file is legitimate. This can occur when a newly distributed application has not yet built a large reputation profile within Microsoft’s ecosystem.
If you encounter a SmartScreen warning, confirm that the installer was obtained directly from scrizen.com and review the applicable installation or troubleshooting guidance before proceeding.
5. Security Limitations
No software, storage environment, website, or transmission method can be guaranteed to be completely secure. ScriZen works to apply appropriate security measures that are proportionate to the nature of the product and the data involved, but users should continue to follow standard security practices on their own systems.
This overview is intended to describe ScriZen’s general security model and operational practices. It does not replace product-specific documentation, support instructions, or any mandatory rights available under applicable law.
6. Responsible Disclosure
If you believe you have identified a legitimate security vulnerability involving any ScriZen product or service, please report it to moc.nezircs@ytiruces. Please include enough detail for us to understand the issue, reproduce it where possible, and assess severity responsibly. We appreciate good-faith reporting.
7. Related Documents & Support Resources
For related information, please review: