Skip to content
Security

Your data is safe with us

We know you're trusting us with access to your business tools. Here's exactly how we protect that trust — in plain English and technical detail.

The short version

  • Your credentials are encrypted with the same standard banks use
  • Each integration runs completely isolated from everything else
  • You control exactly who can access what
  • Every action is logged so you always know what happened
  • Systems self-heal automatically — no babysitting required

In Detail

How we keep you safe

Each security feature explained two ways: what it means for you, and the technical details for your IT team.

Bank-Grade Encryption

What this means for you

Your passwords and API keys are scrambled using the same encryption banks use. Even if someone broke into our servers, they'd only find gibberish.

Technical details

AES-256-GCM encryption at rest. Keys are decrypted only at runtime, never stored in logs or exposed via APIs. Each credential uses a unique initialization vector.

Complete Isolation

What this means for you

Each integration runs in its own private room. If something goes wrong with one service, it can't affect anything else. And there's no back door — everything must go through the front desk (our security checkpoint).

Technical details

Separate Docker containers per integration per tenant with no host port mapping. Containers are only accessible via internal network through the authenticated proxy layer.

Personal Access Keys

What this means for you

Everyone on your team gets their own key. If someone leaves or you need to cut off access, you just revoke their key — nobody else is affected.

Technical details

Per-user tokens with SHA-256 hashing. Token hierarchy: per-integration tokens, user tokens, and master keys. Master keys are resolved at the proxy layer and never forwarded to containers.

Role-Based Access

What this means for you

You decide who can do what. Give your marketing team access to analytics, your sales team access to CRM, and keep everything else locked. Team members only see what they need.

Technical details

Three-tier role system (owner/admin/member) with per-integration assignment and tool-level denylists. Permissions enforced server-side before requests reach integration containers.

Complete Activity Log

What this means for you

See exactly what your AI is doing, when, and who asked it to. If something looks off, you can trace it back immediately. Nothing happens in the dark.

Technical details

Every tool call logged with timestamp, user ID, integration, tool name, and response status. Time-series dashboards for pattern analysis and anomaly detection.

Read-Only Mode

What this means for you

Worried about your AI making changes? Put integrations in read-only mode. Your AI can look at data but can't change anything — great for reports and analysis.

Technical details

Tool categories (read/write/delete) with one-click profiles. Atomic updates to disabled tool lists. Category-based restrictions enforced at proxy layer.

Automatic Recovery

What this means for you

If something crashes, it fixes itself. We check every integration every 30 seconds, and if anything's wrong, it restarts automatically. Your AI keeps working.

Technical details

Health check intervals at 30 seconds with 3 retries before container restart. Auto-heal service monitors all containers. 99.9% uptime guarantee.

Protection from Attacks

What this means for you

We limit how fast anyone can make requests, so even if someone gets your key, they can't abuse it. We also protect against common web attacks that try to trick your browser.

Technical details

In-memory sliding window rate limiting on all endpoints. CSRF protection with cryptographic nonces in httpOnly cookies using timing-safe comparison.

AES-256
Encryption
99.9%
Uptime
30s
Health Checks
100%
Actions Logged

Questions about security?

Our team is happy to walk you through our security practices in detail.

Contact Us