Security & Trust
Open by design. Below is the architecture, the controls in place today, and the certifications we’re building toward — with dates.
Built with security at every layer
Data Encryption
All data encrypted at rest (D1) and in transit (TLS 1.3). API keys stored as hashed secrets.
Access Control
JWT-based authentication with short-lived tokens. Role-based access control for multi-tenant isolation.
Audit Logging
All API access and administrative actions logged. Tamper-resistant audit trail for compliance.
Edge-native, zero-trust architecture
Edge Compute Workers
Edge-native, no traditional servers to compromise. Zero cold starts, global distribution.
D1 Database
SQLite-based, encrypted at rest, automatic backups.
KV Cache
Encrypted, distributed, automatic TTL-based expiry.
Standards we operate to today
Three frameworks shape our day-to-day controls right now. SOC 2 audits are scheduled and we’ll publish the report when we have it — we don’t want to overstate where we are.
We welcome security researchers
We believe that working with skilled security researchers is essential to keeping our platform and users safe. If you discover a vulnerability in Averrow, we encourage you to report it responsibly. We are committed to investigating all legitimate reports and resolving issues as quickly as possible.
We provide a safe harbor for good-faith security researchers. We will not pursue legal action against individuals who discover and report vulnerabilities responsibly, provided they make a good-faith effort to avoid privacy violations, data destruction, and service disruption.
Reporting brand abuse rather than a vulnerability? Forward phishing emails or report impersonation, lookalike domains, and counterfeits at averrow.com/report-abuse.
What we collect and what we don't
● What data we collect
- Domain names
- Email security records (public DNS)
- Social platform public profiles
- Threat feed matches
● What we DON'T collect
- Email content
- Credentials
- Internal network data
- Customer PII beyond account info
● Retention
- Active account data retained during subscription
- Scan results cached 24 hours
- Account deletion within 30 days of request