# Security & Privacy

Personally Identifiable Information

## Scan Data Collection

### Threat Agent Data Collection

During scans that occur while using [Threat Agent](broken://pages/-MbsuX1mY6CMyF3-UEMA), will collect the following data.

* Dependency manager files
* File Metadata
  * File name
  * File size
  * File locations relative to the root of the project
* Whole file SHA1 signatures
* File DNA signatures(As part of TrueMatch)

{% hint style="success" %}
Threat Agent does not collect or transmit your source code to our server during standard scans.
{% endhint %}

{% hint style="warning" %}
**SOURCE CODE** will be collected and transmitted to our server if you select the `--cloud-scan` option when launching Threat Agent.
{% endhint %}

### ThreatScan Data Collection

ThreatScan integrates directly with your authorized SCM; Github, Gitlab, or Bitbucket. During scans, a copy of your code is transmitted to our scan server, processed, and then destroyed. No copy of your code ever remains on our servers.&#x20;

*


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.threatrix.io/resources/scanning.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
