Security

High-level overview of how we think about safety and data separation. This is not a formal security statement or certification.

Auth
Authentication handled via managed provider and access controls.
Data separation
Row-Level Security (RLS) is used to isolate user data.
Principles
Least privilege, secure defaults, and transparency.

Threat model (what we defend against)

We design the product with common SaaS risks in mind. Examples of threats we explicitly consider:

  • Unauthorized access to user portfolios, positions, or transactions.
  • Cross-tenant data leakage (user A seeing user B’s data).
  • Abuse of public endpoints (rate/traffic spikes, scraping, brute forcing access codes).
  • Accidental exposure of secrets through logs, commits, or client-side bundles.

No system is risk-free. If you need a formal security package (SOC2/ISO, pen-test report, etc.), contact us for enterprise evaluation.

Authentication & access

  • Auth provider: user identity handled via managed authentication.
  • Beta gate: invite-only during beta, enforced via access gating.
  • Principle of least privilege: users only access what they own.

If you suspect account compromise, contact us immediately and rotate any relevant credentials.

Data separation (RLS)

User data lives in a database with Row-Level Security (RLS) policies. RLS is designed to prevent accidental cross-user leakage by enforcing authorization at the database layer, not just in the UI.

  • Portfolios/positions/transactions are scoped to a user (directly or via portfolio ownership).
  • Policies restrict reads/writes based on the authenticated user identity.
  • We prefer server-side enforcement for critical boundaries.

Data handling & retention

  • What we store: account identifiers, portfolio records, and events/feedback you submit.
  • What we don’t do: we don’t connect to your brokerage to place trades on your behalf.
  • Retention: we retain data to operate the service; you can request deletion via privacy contact.
Read the full Privacy Policy and Legal pages for disclaimers.

Operational security

  • Secrets: stored in environment variables, never committed to source control.
  • Logging: avoid logging secrets; log enough to support debugging and abuse detection.
  • Abuse controls: rate limiting and gating on sensitive endpoints when needed.
This page is updated as controls mature during beta.

Vulnerability reporting

If you find a security issue, please report it responsibly and include steps to reproduce.

Need a security review?

For professional/enterprise evaluations, contact us and we’ll share the appropriate information under NDA.