πŸ”’
Encrypted Everywhere
TLS 1.3 in transit Β· AES-256 at rest
πŸ”‘
SSO Available
Enterprise SSO via Clerk
βœ…
No Training on Your Data
Your context is never used to train models
πŸ‘₯
Role-Based Access
Granular permissions per workspace
πŸ—„οΈ

What We Store

Transparency starts with telling you exactly what data SLEDS holds.

Data SLEDS stores

●Thread titles, observations, and metadata
●Shared assets (specs, docs, code snippets, configs)
●Knowledge graph links between entities
●User accounts (name, email via Clerk)
●API keys (hashed, never stored in plaintext)
●Workspace membership and role assignments
●Activity logs (who did what, when, via which tool)
●Semantic embeddings for search (pgvector)

Data SLEDS does NOT store

βœ•Passwords (Clerk handles auth entirely)
βœ•Credit card or payment details
βœ•Full conversation transcripts from AI tools
βœ•Raw API responses from your AI providers
βœ•Browser cookies or tracking identifiers
βœ•Personal data beyond account basics
βœ•Source code from your repositories
βœ•File contents from your local machine

SLEDS stores what your team explicitly shares β€” observations, assets, and decisions. We receive only what AI tools send through our MCP endpoint or REST API. We never reach into your tools, repos, or conversations to pull data.

πŸ—οΈ

Infrastructure & Encryption

Where your data lives and how it's protected.

Database

PostgreSQL on Neon (AWS us-east-1). Encrypted at rest with AES-256. Point-in-time recovery. Connection pooling via PgBouncer.

Cache & Real-time

Redis on Upstash (serverless). TLS-encrypted connections. Used for pub/sub events and session caching. Data is ephemeral.

Application

API on Railway (Docker). Frontend on Vercel (edge network). All traffic over TLS 1.3. No data stored at the application layer.

Encryption summary

In transit

All connections use TLS 1.2+ (1.3 preferred). This includes browser β†’ API, API β†’ database, API β†’ Redis, and MCP tool β†’ API connections. No unencrypted endpoints exist.

At rest

Database storage is AES-256 encrypted at the volume level (managed by Neon/AWS). Backups are encrypted with the same standard. API keys are bcrypt-hashed before storage.

πŸ€–

AI Provider Data Handling

How your context interacts with AI models β€” and what we guarantee.

πŸ›‘οΈ

We never train on your data

SLEDS is a context layer β€” we store and serve your team's shared context. We do not send your data to any AI model for training, fine-tuning, or improvement purposes. When you use Frost (our built-in AI assistant), your context is sent to Anthropic's Claude API with zero-retention data policies enabled.

Frost AI Assistant (built-in)

Model provider
Anthropic (Claude Sonnet)
Data retention by provider
Zero β€” Anthropic does not retain API inputs/outputs
What's sent
Relevant thread/asset context for the query, never your full workspace
Training opt-out
Automatic β€” Anthropic API usage is excluded from training by default

Your AI tools (MCP / REST)

Data flow direction
Tools read/write context via authenticated API calls
What SLEDS receives
Only what the tool explicitly sends (observations, assets)
What SLEDS returns
Only context matching the authenticated workspace
Training implications
Subject to each tool's own data policies β€” not SLEDS's responsibility
πŸ”

Authentication & Access Control

How we verify identity and enforce permissions.

User authentication

All user authentication is handled by Clerk. SLEDS never sees or stores passwords. Clerk provides:

●Email/password with bcrypt hashing
●Social login (Google, GitHub)
●Enterprise SSO (SAML, available on Business plan)
●Session management with JWT tokens
●Multi-factor authentication (user-configurable)

API authentication

AI tools authenticate via API keys scoped to individual workspaces:

●API keys prefixed with sleds_ak_ for identification
●Keys are bcrypt-hashed before storage
●Each key is scoped to a single workspace
●Keys can be revoked instantly from the dashboard
●HMAC request signing available for additional verification

Role-based access control

PermissionViewerEditorAdminOwner
Read threads & assetsβœ“βœ“βœ“βœ“
Search contextβœ“βœ“βœ“βœ“
Write observationsβ€”βœ“βœ“βœ“
Share assetsβ€”βœ“βœ“βœ“
Manage membersβ€”β€”βœ“βœ“
Manage API keysβ€”β€”βœ“βœ“
Delete workspaceβ€”β€”β€”βœ“
🏭

Sub-processors & Vendors

Every third-party service that touches your data.

VendorPurposeData ProcessedLocation
NeonPostgreSQL databaseAll persistent data (threads, assets, users, embeddings)AWS us-east-1
UpstashRedis cache & pub/subSession state, real-time events (ephemeral)AWS us-east-1
ClerkAuthenticationUser email, name, auth tokensUS
RailwayAPI hostingRequest processing (no persistence)US
VercelFrontend hostingStatic assets, edge functionsGlobal CDN
AnthropicFrost AI (Claude API)Context snippets for Pulse/assistant queriesUS
OpenAIEmbedding generationText snippets for semantic search vectorsUS

This list is updated when sub-processors change. Last reviewed: February 18, 2026

🚨

Incident Response

What happens when something goes wrong.

1
DetectionImmediate

Automated monitoring via Railway and Vercel dashboards. Error tracking on API responses. Uptime checks on critical endpoints.

2
Triage< 1 hour

Severity assessment (P0–P3). P0 (data breach or total outage) triggers immediate response. All incidents logged with timestamps.

3
Notification< 4 hours for P0/P1

Affected users notified via email for P0/P1 incidents. Status updates posted to our status page. Transparent communication about scope and impact.

4
Resolution & ReviewVaries

Root cause analysis within 48 hours of resolution. Post-mortem published for any P0/P1 incidents. Preventive measures documented and implemented.

πŸ—‘οΈ

Data Deletion & Portability

Your data, your control.

Deletion

Workspace owners can delete individual threads, assets, or entire workspaces from the dashboard. Deletion is permanent and cascading β€” removing a workspace removes all threads, assets, links, and member associations.

Account deletion removes all personal data and workspace memberships. Workspaces you own must be transferred or deleted first.

Database backups are retained for 7 days for disaster recovery, after which deleted data is fully purged.

Portability

All context in SLEDS is accessible via the same API your tools use. You can export your full workspace at any time through the REST API.

Export includes all threads (with observation history), assets, links, and metadata in structured JSON format.

We believe in zero lock-in. Your context is yours β€” we make it easy to take it with you.

πŸ—ΊοΈ

Compliance Roadmap

Where we are and where we're headed. No badges we haven't earned.

NowFoundation
●End-to-end encryption (TLS + AES-256)
●Role-based access control
●API key auth with bcrypt hashing
●SSO via Clerk
●No-training data policy
●Sub-processor documentation
Q2 2026Formalization
●Privacy policy & Terms of Service with legal review
●GDPR data processing documentation
●CCPA opt-out mechanisms
●Formal incident response runbook
●Vulnerability disclosure program
Q4 2026Certification
●SOC 2 Type I audit (targeting Vanta + auditor)
●GDPR compliance certification
●Penetration testing by third party
●Bug bounty program launch
2027Enterprise
●SOC 2 Type II (ongoing compliance)
●HIPAA BAA availability
●Data residency options (EU, APAC)
●SCIM provisioning
●Audit log retention & export
πŸ“¬

Security questions?

For security inquiries, vulnerability reports, or data processing questions:

security@sleds.ai

We aim to acknowledge security reports within 24 hours and provide a substantive response within 72 hours.