Tenant isolation, two walls deep
Postgres row-level security on every tenant-scoped table. Application code also filters by org_id, with the SET LOCAL session variable enforced inside every transaction. Verified by integration tests in CI.
Your inventory is your business. We treat it like ours. Compliance is a roadmap, not a marketing claim — here is exactly where we stand.
Postgres row-level security on every tenant-scoped table. Application code also filters by org_id, with the SET LOCAL session variable enforced inside every transaction. Verified by integration tests in CI.
AES-256-GCM with a per-record Data Encryption Key, wrapped under a Key Encryption Key from env. Annual KEK rotation re-wraps DEKs without re-encrypting payloads. Plaintext credentials never touch the DB.
Clerk-backed identity. Email + password, magic link, Google, Microsoft, GitHub on every plan. SAML SSO and SCIM provisioning on Enterprise. Hardware-key 2FA for admin accounts.
Every state-changing API call writes an audit row with user, org, IP, user-agent, action, before/after diff. Sensitive keys (tokens, secrets, passwords) are redacted before persistence. Export on Pro+.
Cloudflare CDN + Supabase Postgres (Toronto, yyz) + Fly.io workers. Customer data never leaves the region you pick. Daily PITR backups, 30-day window on Team+.
Per-IP DDoS shield in middleware (120 req/min), per-org token bucket on app APIs (30/sec burst, 600/min sustained), tighter limits on OAuth + export endpoints. Backed by Upstash Redis.
Per-request nonce CSP with strict-dynamic. HSTS 2-year preload, X-Frame-Options DENY, COOP same-origin, no inline scripts beyond the framework. Verified by Mozilla Observatory in CI (target: A+).
gitleaks runs on every PR. pnpm audit fails the build at moderate severity. CodeQL extended security pack on push to main. Weekly cron catches advisories that landed since last touch.
security@saferinventory.com — PGP key on /.well-known/security.txt. Initial response within 48 hours, remediation timeline within 5 business days. Hall of fame for credited researchers.
Found a vulnerability?
48-hour acknowledgement · 5-day remediation timeline · Hall of fame credit