Hoist AIAssets Sign in
HomeTrustSecurity

Security.

How we protect the records, the disclosure process, and what we're certified on — including what we're not.

Last updated 2026-05-15

Encryption

  • In transit: TLS 1.3, HSTS preload, certificate pinning on the API host.
  • At rest: AES-256, Cloudflare-managed keys.
  • Per-customer keys: Optional on Team tier — record PDFs encrypted with a key only your account can derive.

Authentication

  • Clerk hosted sign-in for the dashboard: email passcode, password, OAuth (Google, Microsoft), or passkey.
  • OAuth 2.1 + PKCE + Resource Indicators (RFC 8707) for MCP machine clients.
  • API keys are scoped (read-only, read-write, batch-only) and rotatable from the dashboard.

Penetration testing

Annual third-party penetration test. Last test: 2025-09 (pre-launch); next scheduled 2026-09. Executive summary available on request under NDA.

Certifications — honest status

  • SOC 2: Not yet. Will pursue when 5+ enterprise customers require it (we expect this in 2027).
  • ISO 27001: Not yet. Same trigger as SOC 2.
  • PCI-DSS: Out of scope — Stripe is merchant of record and holds card data.
  • IRAP / Australian Government: Not yet. Talk to us if you need this.

We will not display a fake "SOC 2 in progress" badge before it's real. When something changes, it appears in /changelog.

Disclosure policy

Report security issues to [email protected] (PGP fingerprint at /.well-known/security.txt). We acknowledge within 24 hours, fix critical issues within 7 days, disclose publicly within 30 days of fix.

Bug bounty

No formal program yet. We pay A$50–A$2,500 cash for valid security reports depending on severity. Email us; we negotiate per report.

Incidents

None publicly reported. If we have one, it gets a status-page entry, an email to affected customers within 72 hours, and a post-mortem at /blog.