Security

Security is core to how we build

Every layer of OpsConductor is designed with security and data protection in mind — from encryption to access control to responsible disclosure.

SOC 2 In Progress

TLS 1.3

RLS Enforced

No plaintext secrets

Data Encryption

All data transmitted between your browser and OpsConductor is encrypted using TLS 1.3. Data at rest is encrypted using AES-256 encryption via Supabase managed infrastructure. This includes account data, agent configurations, OAuth tokens, and activity logs.

Authentication

OpsConductor uses Supabase Auth for user authentication. Sessions are managed via short-lived JWT tokens with automatic refresh. Passwords are hashed using bcrypt and are never stored in plaintext. Magic link and OAuth-based login flows are supported for passwordless access.

OAuth Token Storage

OAuth tokens for connected integrations (Gmail, Slack, HubSpot, GitHub, Stripe, Linear, Notion) are stored in the database with row-level security (RLS) policies. Tokens are never exposed to the client-side application. Token refresh is handled server-side, and tokens are immediately deleted when an integration is disconnected.

Access Control

All database tables are protected by row-level security (RLS) policies. Workspace isolation ensures that users can only access data within their own workspace. Role-based access control (Admin, Operator, Viewer) restricts what actions each team member can perform. Cross-workspace data access is not possible by design.

Responsible Disclosure

If you discover a security vulnerability in OpsConductor, we ask that you disclose it responsibly. Please report any security issues directly to security@opsconductor.io. Do not disclose vulnerabilities publicly until we have had a reasonable opportunity to address them. We commit to acknowledging reports within 48 hours and providing a timeline for resolution.

Report a vulnerability

Found a security issue? We take every report seriously and will respond within 48 hours.

security@opsconductor.io