Security

How we protect your credentials and data.

Rhumb sits between your agent and third-party APIs. That position demands trust. This page documents exactly what we do to earn it — and what we don't do yet.

Last updated March 2026 · Report a vulnerability →

AES-256

Credential encryption

TLS 1.2+

All API traffic

Fail-closed

Billing architecture

Zero-log

Execution payloads

🔐 Credential Management

Encryption at rest

Live

All stored credentials are encrypted using AES-256-GCM. Encryption keys are managed via environment variables on Railway's infrastructure, isolated from application code.

Encryption in transit

Live

All API traffic uses TLS 1.2+ (HTTPS only). HSTS headers enforce secure connections. No plaintext credential transmission.

Credential isolation

Live

BYOK and Agent Vault credentials are scoped per-agent and never shared across accounts. Rhumb-managed credentials are held by Rhumb and never exposed to agents.

No credential logging

Live

API keys, tokens, and secrets are never written to application logs, error reports, or analytics. Request bodies containing credentials are redacted before logging.

Credential rotation

Live

Agent Vault credentials support rotation without downtime. BYOK credentials are managed by the agent operator.

🛡️ API Security

Authentication

Live

Governed API key and wallet-prefund repeat traffic authenticate with X-Rhumb-Key. x402 per-call uses X-Payment from the payer wallet. BYOK and Agent Vault provider-control paths route through provider-scoped credentials via Rhumb. Session cookies are HttpOnly, Secure, SameSite=Strict.

Rate limiting

Live

Per-agent rate limiting on all endpoints. Execution endpoints have stricter limits. 429 responses include Retry-After headers.

Request validation

Live

All inputs are validated and sanitized. SQL injection, XSS, and path traversal protections are enforced.

Error handling

Live

Standardized error envelope with request_id for traceability. Resolution guidance in every error response. No stack traces or internal details in production errors.

Security headers

Live

Content-Security-Policy, X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, and Permissions-Policy headers on all responses.

x402 replay prevention

Live

On-chain payment proofs are validated for uniqueness. The same transaction hash cannot be used for multiple executions.

📦 Data Handling

Execution data

Live

Request and response payloads for executed capabilities are proxied in real-time and not stored. Rhumb logs execution metadata (timestamp, capability, cost, status) but not the payload content.

Score data

Live

AN Scores, reviews, and service metadata are public by design. No personal data is included in scoring.

Agent identity

Live

Minimal data collection: email address for account creation, governed API key for authentication. No phone numbers, addresses, or payment details stored by Rhumb (Stripe handles payment data).

Data residency

Live

Application infrastructure runs on Railway (US regions). Database on Supabase (AWS us-east-1). All data is currently US-hosted.

Data deletion

Live

Account deletion removes all associated data: governed API keys, execution logs, billing records, and stored credentials. Contact team@supertrained.ai to request deletion.

💳 Billing & Payment Security

Fail-closed billing

Live

If the billing system is unreachable, managed executions are blocked — never executed without confirmed payment. This is a hard architectural constraint, not a configuration option.

Stripe integration

Live

Payment card processing is handled entirely by Stripe. Rhumb never sees, stores, or processes card numbers. PCI compliance is delegated to Stripe.

x402 verification

Live

On-chain payments are verified against the Base network. Contract address, amount, sender, and confirmation status are all validated before execution proceeds.

Budget controls

Live

Per-agent budget limits, daily execution caps, and upstream provider budget tracking prevent runaway costs. Agents can set their own spend caps.

🏗️ Infrastructure

Hosting

Live

API on Railway (auto-scaling, isolated containers). Frontend on Vercel (edge-deployed). Database on Supabase (managed PostgreSQL with Row Level Security).

Deployment

Live

Automated deployments from GitHub. No manual server access. Infrastructure-as-code configuration.

Monitoring

Live

Application health monitoring, error tracking, and uptime checks. Public status page at rhumb.dev/status.

Incident response

Live

Documented runbooks for Supabase outage, proxy provider failure, billing failure, x402 settlement failure, and deployment rollback scenarios.

📋 Compliance Roadmap

GDPR

Live

Data minimization, deletion on request, no unnecessary data collection. Privacy policy documents all data processing. DPA available on request for enterprise customers.

CCPA

Live

California Consumer Privacy Act compliance: data disclosure, deletion, and opt-out rights documented in privacy policy.

SOC 2 Type I

Planned

Planned for evaluation. Timeline will be published when engagement is confirmed with an auditing firm.

SOC 2 Type II

Planned

Follows Type I. Requires 6+ months of continuous control evidence.

HIPAA BAA

Planned

Not currently available. Will be evaluated based on customer demand.

Vulnerability Disclosure

If you discover a security vulnerability in Rhumb, please report it responsibly:

  • Email security@supertrained.ai with a description of the vulnerability
  • Include steps to reproduce, expected vs. actual behavior, and any proof-of-concept
  • We will acknowledge receipt within 48 hours and provide a timeline for resolution
  • Please do not publicly disclose the vulnerability until we've had a reasonable opportunity to address it