Your agent's memories are sensitive data. We treat them that way. Here's how 0Latency protects your data at every layer.
Every API request is scoped to your tenant via Row-Level Security (RLS) policies on all 13+ database tables. Cross-tenant data access is architecturally impossible — verified by automated SQL injection testing.
SET LOCAL per requestEvery memory submitted to 0Latency is automatically scanned for API keys, tokens, passwords, and other secrets. If a secret is detected, the memory is rejected before storage — your keys never touch our database.
/extract callSHA-256 hashed keys with instant rotation and revocation. Compromised key? Rotate in one API call. Old key is immediately invalid across all workers via Redis cache invalidation.
POST /admin/rotate-keyPOST /admin/revoke-keyRedis-backed rate limiting that survives restarts. Per-tenant limits based on plan tier. No abuse, no overload, no surprise bills.
Every memory operation is logged with tenant ID, request ID, timestamp, and action type. Full audit trail for compliance and debugging.
Every webhook payload is signed with HMAC-SHA256. Verify the signature to confirm it came from 0Latency and hasn't been tampered with. Failed deliveries retry with exponential backoff.
All inputs are validated and sanitized before processing. Error messages are generic — no database internals, no stack traces, no information leakage.
HTTPS everywhere. Security headers on all responses. Admin endpoints restricted to localhost. Automated database backups.
The following patterns are automatically scanned on every memory submission. This list is also available programmatically via GET /api/v1/security/patterns.
| Pattern | Prefix / Format | Description |
|---|---|---|
| PyPI Token | pypi-... | PyPI API token |
| GitHub PAT | ghp_... | GitHub personal access token |
| GitHub OAuth | gho_... | GitHub OAuth access token |
| OpenAI Key | sk-... | OpenAI API key |
| Anthropic Key | sk-ant-... | Anthropic API key |
| Stripe Secret | sk_live_... / sk_test_... | Stripe secret key |
| AWS Access Key | AKIA... | AWS access key ID |
| Slack Token | xoxb-... / xoxp-... | Slack bot or user token |
| Twilio | AC... / SK... | Twilio account SID or API key |
| SendGrid | SG.... | SendGrid API key |
| Google API | AIza... | Google API key |
| Supabase | sbp_... / sb_secret_... | Supabase project or service role key |
| Bearer Token | Bearer ... | Authorization header token |
| Generic Secret | api_key=... | Key-value secret assignments |
Our test suite covers authentication, extraction, recall, SQL injection prevention, tenant isolation, pagination, input validation, key rotation, revocation, data export, batch operations, graph memory, webhooks, versioning, criteria scoring, custom schemas, organization memory, and security regression. Every commit runs the full suite.
Email: [email protected]
Response time: 24 hours