Skip to content
Platform Security

Security at Curate-Me

Security is foundational to everything we build. As a governance layer for AI agents, we treat the protection of your data and infrastructure as our highest priority.

Data Center

Germany (EU)

ISO 27001 certified

Encryption

AES-256 + TLS

At rest & in transit

Key Storage

SHA-256

Hashed, never plaintext

Audit Events

27 types

Immutable trail

Infrastructure Security

Data Center Location

European data centers in Germany (EU), with physical security controls including biometric access, 24/7 CCTV, and redundant power.

Encryption in Transit

All connections use TLS 1.2 or higher. HSTS is enforced. We maintain an A+ SSL Labs rating.

Encryption at Rest

All data at rest is encrypted using AES-256 encryption, including database storage, backups, and log archives.

Network Security

Strict firewall rules, private networking between services, and no direct database exposure to the public internet.

Backups

Automated daily backups with point-in-time recovery. Backups are encrypted and stored in a separate geographic location.

Authentication & Access Control

JWT Authentication

Dashboard and API access is secured with JSON Web Tokens (JWT) with short-lived access tokens and secure refresh token rotation.

API Key Hashing

All API keys (cm_sk_*) are hashed using SHA-256 before storage. Plaintext keys are shown once at creation and never stored or logged.

Password Security

Passwords are hashed using bcrypt with appropriate work factors. We enforce minimum password strength requirements.

Two-Factor Authentication

2FA support via TOTP (authenticator apps). Available for all account types and recommended for organization administrators.

OAuth Integration

Secure OAuth 2.0 sign-in via Google and GitHub. We request only the minimum required scopes (email and profile).

Gateway Security

SSRF Protection

The gateway proxy validates upstream URLs against an allowlist of known LLM provider endpoints. Internal network addresses, metadata endpoints, and file:// URIs are blocked.

PII Scanning

Regex-based scanning detects API keys, passwords, email addresses, phone numbers, SSNs, and credit card numbers in request payloads before they reach LLM providers.

Prompt Injection Detection

Content safety checks identify common prompt injection patterns and can block or flag suspicious inputs based on your governance policy configuration.

Rate Limiting

Per-organization and per-key rate limiting prevents abuse and runaway consumption. Limits are configurable per governance policy.

Request Validation

All gateway requests are validated for proper formatting, supported models, and policy compliance before proxying to upstream providers.

Data Isolation & Multi-Tenancy

Organization-Scoped Data

All data access is scoped to the authenticated organization. Tenant isolation middleware enforces data boundaries at the API layer, preventing cross-organization data access.

API Key Isolation

Each API key is bound to a specific organization. Keys cannot access data or resources belonging to other organizations.

Runner Isolation

Managed runners operate in isolated environments with configurable access tiers (READ_ONLY, WRITE_RESTRICTED, WRITE_PROJECT, FULL_ACCESS). Each runner session is confined to its designated environment.

Network Phase Separation

Runner network access follows a SETUP / EXECUTION / TEARDOWN model. During EXECUTION, network access is severed to prevent data exfiltration.

Compliance & Certifications

SOC 2 Type II

In Progress

We are targeting SOC 2 Type II certification. Our security controls are designed to meet the Trust Services Criteria for security, availability, and confidentiality.

GDPR Ready

Ready

Infrastructure hosted in EU (Germany), data processing agreements available on request, data portability via API, and account deletion within 30 days. See our Privacy Policy for details.

EU AI Act Ready

Ready

Built-in support for human oversight (HITL), immutable audit trails, PII scanning, and record-keeping. See our Compliance page for the full requirements mapping.

Immutable Audit Trail

Active

27 event types recorded to an append-only audit log covering every gateway request, governance decision, runner lifecycle event, and approval action. Retained for 1 year.

Vulnerability Disclosure

Responsible Disclosure

We maintain a responsible vulnerability disclosure program. If you discover a security vulnerability, please report it to security@curate-me.ai. We commit to acknowledging reports within 24 hours and providing status updates within 5 business days.

No Legal Action

We will not pursue legal action against researchers who discover and report vulnerabilities responsibly, provided they do not access customer data, cause service disruption, or publicly disclose before we have had reasonable time to address the issue.

Security Updates

Critical security patches are deployed within 24 hours of verification. We notify affected customers via email for any vulnerabilities that may have exposed their data.

Service Status

Monitor real-time platform availability, gateway uptime, and incident reports on our status page.

View Status Page

Report a Vulnerability

Found a security issue? We take all reports seriously and respond within 24 hours.

security@curate-me.ai

For more information, see our Privacy Policy, Terms of Service, and EU AI Act Compliance pages.