deepread
Audited by Socket on Feb 27, 2026
1 alert found:
MalwareNo evidence of covert malicious code or obfuscated/hidden backdoors in this documentation fragment. Primary risks are privacy and data exposure inherent to sending documents and training data to a third-party service: unauthenticated public preview URLs, potential retention/use of training documents, webhook delivery to user-supplied endpoints without documented signing, and guidance that may encourage embedding API keys in repo-tracked config files. Recommendation: treat DeepRead as a high-trust vendor for sensitive documents until vendor provides explicit policies and controls (preview URL authentication/expiry, webhook signing, training data usage/retention/deletion, key scoping/rotation, encryption-at-rest). Avoid uploading regulated or highly sensitive documents without contractual guarantees and prefer short-lived/scoped credentials and authenticated previews/webhooks.