Encryption
Data is encrypted in transit with TLS 1.2+ and at rest with provider-managed AES-256 (Supabase Postgres, Google Cloud Storage). Backups inherit the same encryption envelope.
Security
Autousers is a pre-seed company — we’re building security posture deliberately and transparently from day one. The shape below is what we have today; SOC 2 work is in motion. Found something concerning? contact@autousers.ai — we triage every report.
Data is encrypted in transit with TLS 1.2+ and at rest with provider-managed AES-256 (Supabase Postgres, Google Cloud Storage). Backups inherit the same encryption envelope.
Supabase Auth handles user sessions with rotating refresh tokens, secure HttpOnly cookies, and OAuth/SSO providers. API access uses scoped bearer tokens (CLI, MCP) or short-lived JWTs (Figma plugin).
Postgres Row-Level Security enforces team-scoped access on every read and write — even an authenticated user can never see another team's data without an explicit share grant.
Hosted on Vercel + Supabase + Google Cloud, all SOC 2 Type II certified. Production secrets live in Vercel + GCP Secret Manager, never in source control. Workload Identity Federation replaces long-lived service-account keys.
Sentry for error tracking, Vercel Analytics + observability for runtime, Supabase audit logs for database access. We page on anomalies and review access logs regularly.
GDPR-aligned data handling, with a Data Processing Addendum available on request. SOC 2 Type I in progress with a Q3 2026 target. HIPAA and FedRAMP not currently in scope.
Email contact@autousers.ai with reproduction steps and any artifacts. We acknowledge within 48 hours, target an initial assessment within five business days, and coordinate disclosure once a fix is shipped. We don’t run a paid bug-bounty programme yet, but we’re happy to credit researchers in our changelog and on this page when a public CVE lands.