Security
How we protect your credentials and data.
Rhumb sits between your agent and third-party APIs. That position demands trust. This page documents exactly what we do to earn it — and what we don't do yet.
Last updated March 2026 · Report a vulnerability →
AES-256
Credential encryption
TLS 1.2+
All API traffic
Fail-closed
Billing architecture
Zero-log
Execution payloads
🔐 Credential Management
Encryption at rest
LiveAll stored credentials are encrypted using AES-256-GCM. Encryption keys are managed via environment variables on Railway's infrastructure, isolated from application code.
Encryption in transit
LiveAll API traffic uses TLS 1.2+ (HTTPS only). HSTS headers enforce secure connections. No plaintext credential transmission.
Credential isolation
LiveBYOK and Agent Vault credentials are scoped per-agent and never shared across accounts. Rhumb-managed credentials are held by Rhumb and never exposed to agents.
No credential logging
LiveAPI keys, tokens, and secrets are never written to application logs, error reports, or analytics. Request bodies containing credentials are redacted before logging.
Credential rotation
LiveAgent Vault credentials support rotation without downtime. BYOK credentials are managed by the agent operator.
🛡️ API Security
Authentication
LiveGoverned API key and wallet-prefund repeat traffic authenticate with X-Rhumb-Key. x402 per-call uses X-Payment from the payer wallet. BYOK and Agent Vault provider-control paths route through provider-scoped credentials via Rhumb. Session cookies are HttpOnly, Secure, SameSite=Strict.
Rate limiting
LivePer-agent rate limiting on all endpoints. Execution endpoints have stricter limits. 429 responses include Retry-After headers.
Request validation
LiveAll inputs are validated and sanitized. SQL injection, XSS, and path traversal protections are enforced.
Error handling
LiveStandardized error envelope with request_id for traceability. Resolution guidance in every error response. No stack traces or internal details in production errors.
Security headers
LiveContent-Security-Policy, X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, and Permissions-Policy headers on all responses.
x402 replay prevention
LiveOn-chain payment proofs are validated for uniqueness. The same transaction hash cannot be used for multiple executions.
📦 Data Handling
Execution data
LiveRequest and response payloads for executed capabilities are proxied in real-time and not stored. Rhumb logs execution metadata (timestamp, capability, cost, status) but not the payload content.
Score data
LiveAN Scores, reviews, and service metadata are public by design. No personal data is included in scoring.
Agent identity
LiveMinimal data collection: email address for account creation, governed API key for authentication. No phone numbers, addresses, or payment details stored by Rhumb (Stripe handles payment data).
Data residency
LiveApplication infrastructure runs on Railway (US regions). Database on Supabase (AWS us-east-1). All data is currently US-hosted.
Data deletion
LiveAccount deletion removes all associated data: governed API keys, execution logs, billing records, and stored credentials. Contact team@supertrained.ai to request deletion.
💳 Billing & Payment Security
Fail-closed billing
LiveIf the billing system is unreachable, managed executions are blocked — never executed without confirmed payment. This is a hard architectural constraint, not a configuration option.
Stripe integration
LivePayment card processing is handled entirely by Stripe. Rhumb never sees, stores, or processes card numbers. PCI compliance is delegated to Stripe.
x402 verification
LiveOn-chain payments are verified against the Base network. Contract address, amount, sender, and confirmation status are all validated before execution proceeds.
Budget controls
LivePer-agent budget limits, daily execution caps, and upstream provider budget tracking prevent runaway costs. Agents can set their own spend caps.
🏗️ Infrastructure
Hosting
LiveAPI on Railway (auto-scaling, isolated containers). Frontend on Vercel (edge-deployed). Database on Supabase (managed PostgreSQL with Row Level Security).
Deployment
LiveAutomated deployments from GitHub. No manual server access. Infrastructure-as-code configuration.
Monitoring
LiveApplication health monitoring, error tracking, and uptime checks. Public status page at rhumb.dev/status.
Incident response
LiveDocumented runbooks for Supabase outage, proxy provider failure, billing failure, x402 settlement failure, and deployment rollback scenarios.
📋 Compliance Roadmap
GDPR
LiveData minimization, deletion on request, no unnecessary data collection. Privacy policy documents all data processing. DPA available on request for enterprise customers.
CCPA
LiveCalifornia Consumer Privacy Act compliance: data disclosure, deletion, and opt-out rights documented in privacy policy.
SOC 2 Type I
PlannedPlanned for evaluation. Timeline will be published when engagement is confirmed with an auditing firm.
SOC 2 Type II
PlannedFollows Type I. Requires 6+ months of continuous control evidence.
HIPAA BAA
PlannedNot currently available. Will be evaluated based on customer demand.
Vulnerability Disclosure
If you discover a security vulnerability in Rhumb, please report it responsibly:
- → Email security@supertrained.ai with a description of the vulnerability
- → Include steps to reproduce, expected vs. actual behavior, and any proof-of-concept
- → We will acknowledge receipt within 48 hours and provide a timeline for resolution
- → Please do not publicly disclose the vulnerability until we've had a reasonable opportunity to address it