Security

Last reviewed: [INSERT DATE]

This page describes how we protect your data and isolate user code. The full threat model lives in our internal docs/security.md — happy to share with prospective enterprise customers under NDA.

Encryption

Authentication

Container isolation

User code runs in Docker-isolated containers with the following posture:

Data isolation

Payments

Infrastructure

Operational practices

Vulnerability disclosure

If you find a security issue, please report it responsibly:

Out of scope (for vulnerability reports)

Compliance roadmap