Security
Protecting your revenue data is fundamental to everything we build. Here is how we keep your information safe.
Per-Org Data Isolation
Every organization runs on its own isolated Postgres schema. No shared tables, no co-mingled data. Your revenue data never crosses tenant boundaries.
Encryption At Rest and In Transit
All data is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption. Credentials and API keys are stored encrypted and only decrypted at the moment of use.
Workspace-Scoped Access
Every API request is scoped to the authenticated user's workspace and role. All database queries enforce org and user ownership checks, preventing cross-tenant data access.
Full Audit Trail
Every AI action, agent execution, skill invocation, and data access is logged with timestamps. See exactly what happened, when, and why — with full replay capability.
Cryptographic OAuth Security
OAuth flows are bound to the initiating user via signed state tokens. Callbacks verify the cryptographic signature, preventing session fixation and cross-user authorization hijacking.
Minimal Data Access
When connecting third-party services like Salesforce, Gong, or Slack, we only request the minimum scopes required to perform your configured automations. We never access more data than necessary.
AI Data Handling
Data obtained from third-party APIs is never used to train AI models. Claude receives pre-assembled context payloads and returns structured output — it never queries your data sources directly.
Staging & Deployment Pipeline
All agent, skill, and trigger changes go through a staging pipeline before reaching production. Version control, rollbacks, and promotion gates ensure nothing ships untested.
Role-Based Access Control
Granular permissions for every role — Admin, Builder, Viewer, Auditor. Control who can create agents, manage integrations, access billing, and configure governance settings.
Infrastructure Security
Hosted on SOC 2-compliant cloud infrastructure with private networking between services, automated security patching, and continuous monitoring. Powered by Vercel and Neon Postgres.
Human in the Loop
High-stakes AI actions require human approval before execution. The tiered autonomy model (Observe → Recommend → Execute) ensures AI earns trust through measurable accuracy before acting independently.
LLM Observability
Full visibility into every AI call — cost, latency, model usage, input/output pairs, and quality metrics. Track and audit AI behavior across your entire platform in real time.
Penetration Testing
RevLlama undergoes regular third-party penetration testing by independent security firms. Test results and remediation status are available upon request for customers undergoing vendor security review. Contact security@revllama.com for details.
Reporting Vulnerabilities
If you discover a security vulnerability, please report it responsibly by emailing security@revllama.com. We take all reports seriously and will respond promptly.
Questions?
For any questions about our security practices, please contact us at security@revllama.com or review our Privacy Policy.