Security at Curate-Me
Security is foundational to everything we build. As a governance layer for AI agents, we treat the protection of your data and infrastructure as our highest priority.
Data Center
Germany (EU)
ISO 27001 certified
Encryption
AES-256 + TLS
At rest & in transit
Key Storage
SHA-256
Hashed, never plaintext
Audit Events
27 types
Immutable trail
Infrastructure Security
Data Center Location
European data centers in Germany (EU), with physical security controls including biometric access, 24/7 CCTV, and redundant power.
Encryption in Transit
All connections use TLS 1.2 or higher. HSTS is enforced. We maintain an A+ SSL Labs rating.
Encryption at Rest
All data at rest is encrypted using AES-256 encryption, including database storage, backups, and log archives.
Network Security
Strict firewall rules, private networking between services, and no direct database exposure to the public internet.
Backups
Automated daily backups with point-in-time recovery. Backups are encrypted and stored in a separate geographic location.
Authentication & Access Control
JWT Authentication
Dashboard and API access is secured with JSON Web Tokens (JWT) with short-lived access tokens and secure refresh token rotation.
API Key Hashing
All API keys (cm_sk_*) are hashed using SHA-256 before storage. Plaintext keys are shown once at creation and never stored or logged.
Password Security
Passwords are hashed using bcrypt with appropriate work factors. We enforce minimum password strength requirements.
Two-Factor Authentication
2FA support via TOTP (authenticator apps). Available for all account types and recommended for organization administrators.
OAuth Integration
Secure OAuth 2.0 sign-in via Google and GitHub. We request only the minimum required scopes (email and profile).
Gateway Security
SSRF Protection
The gateway proxy validates upstream URLs against an allowlist of known LLM provider endpoints. Internal network addresses, metadata endpoints, and file:// URIs are blocked.
PII Scanning
Regex-based scanning detects API keys, passwords, email addresses, phone numbers, SSNs, and credit card numbers in request payloads before they reach LLM providers.
Prompt Injection Detection
Content safety checks identify common prompt injection patterns and can block or flag suspicious inputs based on your governance policy configuration.
Rate Limiting
Per-organization and per-key rate limiting prevents abuse and runaway consumption. Limits are configurable per governance policy.
Request Validation
All gateway requests are validated for proper formatting, supported models, and policy compliance before proxying to upstream providers.
Data Isolation & Multi-Tenancy
Organization-Scoped Data
All data access is scoped to the authenticated organization. Tenant isolation middleware enforces data boundaries at the API layer, preventing cross-organization data access.
API Key Isolation
Each API key is bound to a specific organization. Keys cannot access data or resources belonging to other organizations.
Runner Isolation
Managed runners operate in isolated environments with configurable access tiers (READ_ONLY, WRITE_RESTRICTED, WRITE_PROJECT, FULL_ACCESS). Each runner session is confined to its designated environment.
Network Phase Separation
Runner network access follows a SETUP / EXECUTION / TEARDOWN model. During EXECUTION, network access is severed to prevent data exfiltration.
Compliance & Certifications
SOC 2 Type II
In ProgressWe are targeting SOC 2 Type II certification. Our security controls are designed to meet the Trust Services Criteria for security, availability, and confidentiality.
GDPR Ready
ReadyInfrastructure hosted in EU (Germany), data processing agreements available on request, data portability via API, and account deletion within 30 days. See our Privacy Policy for details.
EU AI Act Ready
ReadyBuilt-in support for human oversight (HITL), immutable audit trails, PII scanning, and record-keeping. See our Compliance page for the full requirements mapping.
Immutable Audit Trail
Active27 event types recorded to an append-only audit log covering every gateway request, governance decision, runner lifecycle event, and approval action. Retained for 1 year.
Vulnerability Disclosure
Responsible Disclosure
We maintain a responsible vulnerability disclosure program. If you discover a security vulnerability, please report it to security@curate-me.ai. We commit to acknowledging reports within 24 hours and providing status updates within 5 business days.
No Legal Action
We will not pursue legal action against researchers who discover and report vulnerabilities responsibly, provided they do not access customer data, cause service disruption, or publicly disclose before we have had reasonable time to address the issue.
Security Updates
Critical security patches are deployed within 24 hours of verification. We notify affected customers via email for any vulnerabilities that may have exposed their data.
Service Status
Monitor real-time platform availability, gateway uptime, and incident reports on our status page.
View Status PageReport a Vulnerability
Found a security issue? We take all reports seriously and respond within 24 hours.
security@curate-me.aiFor more information, see our Privacy Policy, Terms of Service, and EU AI Act Compliance pages.