Security
Effective as of March 22, 2026. This summary is provided for transparency; it is not legal advice.
Security program
We maintain administrative, technical, and organizational controls appropriate for a hosted financial workflow platform, including access controls, logging, and environment-level secret management.
Access controls
Access to privileged surfaces is role-restricted. Administrative routes are limited to authorized operators and protected by authentication and session controls.
Data handling and encryption
Data is protected in transit using standard transport encryption. Infrastructure and persistence protections are applied according to provider capabilities and operational policy.
Monitoring and response
We monitor operational health and security-relevant failures. Where required, incidents are triaged, contained, and remediated through documented runbooks and post-incident review.
Shared responsibility
Users are responsible for account hygiene, prompt-level data minimization, and safeguarding access credentials. Do not submit highly sensitive data unless explicitly approved by your organization.
Questions
For security posture questions, use the support or operator contact path in your onboarding workflow. For active vulnerabilities, use the dedicated reporting page linked below.