Security

Last updated: April 11, 2026

ClawPipe sits between your application and your LLM providers. That's a sensitive position. This page documents what we protect, how we protect it, and how to report a vulnerability.

The short version. API keys are hashed. Provider secrets are encrypted at rest. Prompt content is never logged. The gateway runs on Cloudflare's edge with isolation per Worker invocation. You can also run the SDK fully local and never touch our gateway.

Data at a glance

DataStorageProtection
Account passwordD1Argon2id hash, never plaintext
Session tokenHttpOnly cookieSigned JWT, 30-day expiry
Project API keyD1SHA-256 hash, plaintext shown once
Provider API key (BYOK)Cloudflare KVEncrypted at rest, decrypted at request time only
Prompt textNot storedHash-only for cache lookup
Request metadataD1Provider, model, tokens, latency, cost

Authentication

Authorization

Encryption

Network and isolation

Secret handling

Logging and audit

Development and CI

Third-party providers

Responsible disclosure

If you find a vulnerability, please email [email protected] with enough detail to reproduce it. We commit to:

Please do not run scans or exploit tests against production accounts other than your own. Do not access or modify other users' data. We will not pursue action against researchers who act in good faith.

Compliance roadmap

ClawPipe is a young product. We do not yet carry SOC 2 or ISO certifications in our own name. Our immediate roadmap: HIPAA-eligible deployment option for Enterprise, SOC 2 Type I audit in 2026, and Type II in 2027. Enterprise customers with specific compliance needs should contact [email protected].