Trust Center

Security-conscious posture for buyer review.

A transparent view of current safeguards, staged verification requirements, server-side control boundaries, and enterprise roadmap items without unsupported certification claims.

Staged verification required

Production hardening checklist

AgentFlow Enterprise is structured around security-conscious operating principles such as server-side secrets, protected dashboard access, managed infrastructure, and controlled evidence collection. Formal certifications are not claimed.

EU-aware processing

GDPR-conscious design

The product language and data model are designed around B2B data minimization, clear processing purposes, processor awareness, and customer-controlled lead data.

Supabase auth

Authentication posture

Email login, magic links, Google OAuth, server-side callback handling, session cookies, and protected dashboard routing are supported through Supabase.

Stripe server route

Billing protection

Stripe Checkout is created on the server. Secret keys stay in server-side environment variables and are not exposed to client-side code.

Signature checks

Webhook verification

Stripe and GitHub Sponsors webhook handling includes signature verification patterns so provider events are processed through server-side routes before persistence.

Secrets not in browser

Server-side AI calls

AI qualification routes keep OpenAI credentials server-side and return constrained result fields instead of exposing provider keys or raw provider payloads to the browser.

Buyer due diligence ready

Audit evidence posture

Audit events, payment records, integration events, and verification runbooks support due-diligence review, while staged provider evidence remains separate from public code.

Vendor review

Subprocessor awareness

Expected subprocessors include Supabase, Vercel, OpenAI, Stripe, and HubSpot. Production buyers should review regions, DPAs, and active services before launch.

Customer-defined policy

Data retention roadmap

Retention windows for leads, AI outputs, usage events, logs, and CRM sync records should be configured by workspace or contract requirements.

Incident response path

Breach notification readiness

Production launch should define severity levels, owner escalation, regulator/customer notification workflows, evidence capture, and post-incident review.

Enterprise control

Role-based access roadmap

Workspace roles, least-privilege permissions, approval flows, and tenant-aware access controls are part of the enterprise deployment roadmap.

Implementation option

Private deployment available

Enterprise buyers can discuss private deployment, dedicated environments, custom data retention, and integration-specific controls during strategy planning.

Security contact

Responsible disclosure

Security reports can be sent to [email protected]. Production customers should define incident response, monitoring, and escalation requirements during implementation.

Legal honesty

No unsupported claims

AgentFlow Enterprise does not present certifications, large-enterprise adoption, verified customer relationships, or live revenue outcomes unless separately verified.