Security & Trust

Built for teams that can't afford to move fast and break things.

Your Slack conversations, competitor research, and growth decisions pass through us. Here's exactly how we protect them.

Contact security teamRequest DPA
Encryption

Encrypted in transit, encrypted at rest

Every byte of your data is encrypted end-to-end. We use industry-standard primitives — no in-house cryptography.

  • TLS 1.3 for all traffic between your browser, our Portal, and tenant gateways
  • AES-256-GCM at rest for gateway tokens and connector secrets
  • Scrypt password hashing using OWASP-recommended parameters
  • HMAC-SHA256 signed session cookies, rotated on each sign-in
Tenant isolation

Each customer runs on its own instance

Your data never shares a process with another customer. Every tenant gets a dedicated OpenClaw runtime on a distinct port and URL, with its own workspace, memory, and data store.

  • Separate WebSocket connection per tenant — no shared event loop
  • Separate SQLite store per tenant — no shared tables, no noisy-neighbor queries
  • Per-tenant OpenClaw workspace — USER.md and every officer's MEMORY.md live inside your workspace only; no shared memory or cross-client learning
  • Cross-tenant access checks in every read and write — a single contract, enforced system-wide
  • Device-paired ed25519 authentication for operator scopes — shared tokens alone cannot elevate
Access control

Least-privilege from day one

Employees access customer data only when needed to operate the service, and every access is logged.

  • Role-separated authentication (operator vs customer) enforced at the middleware layer
  • No direct database access from production laptops — all reads go through audited tooling
  • Quarterly access reviews with automatic revocation on role change
  • Session binding to device identity for operator-scope actions
Data lifecycle

You own your data, and you can take it with you

Your findings, briefings, approvals, and evidence chains belong to you. We store them, we don't license them.

  • One-click full data export in JSON — anytime, any plan
  • 30-day retention after cancellation, then cryptographic purge
  • No training of AI models on customer content, ever
  • Data residency in SG, US, or EU — you pick at onboarding
Compliance

Standards we hold ourselves to,
with status in the open.

SOC 2 Type II
In progress
Audit underway · report available on Scale plan or on request under NDA once issued
GDPR
In progress
Working toward full alignment · DPA available to all paid customers · EU-based subprocessors only for EU tenants
CCPA
In progress
Consumer rights honored today · formal attestation pending · see Privacy Policy for your rights
ISO 27001
Planned 2026
Tracking Q4 2026 certification · inherits most controls from SOC 2 work
HIPAA
Not covered
We are not a Business Associate · do not send us PHI
Operations

The boring work that
keeps the lights on.

Continuous monitoring

24/7 automated monitoring of gateway health, queue depth, error rates, and anomalous access patterns.

Incident response

On-call rotation. P1 response < 15 min. Post-mortems published to affected customers within 72h.

Backups

Per-tenant SQLite snapshots every hour. 30-day point-in-time restore. Annual restore drills.

Vulnerability management

Weekly dependency audits. Critical CVEs patched within 48h. Pen-test annually by an external firm.

Secure SDLC

Code review required for every change. No force-push to main. Pre-commit hooks on secrets scanning.

Baseline images

Production runtime pinned to a vetted version tag — upstream upgrades regression-tested before promotion.

Subprocessors

Every third party we use,
named and accountable.

We notify paid customers at least 30 days before adding a new subprocessor. Existing customers can object in writing; if we can't find an alternative, you may terminate for cause.

Vendor
Purpose
Region
Railway
Application + database hosting
US / EU
Cloudflare
CDN, DDoS protection, WAF
Global edge
Anthropic
LLM inference for agent reasoning
US
Google (Gemini)
LLM inference (optional, per-tenant)
US / EU
Resend
Transactional email
US
Stripe
Billing and payment processing
US / EU / SG
Responsible disclosure

Found a vulnerability? Tell us first.

Email us at [email protected]. We acknowledge within one business day, investigate in good faith, and publicly credit you when the fix ships (unless you ask otherwise). No legal action against good-faith researchers.

Report a vulnerability

Last reviewed: 2026-04-20 · questions? [email protected]

Security & Trust · Ceres