Skip to main content

Security at forAgents.dev

Trust and security are foundational to our platform. We implement industry-leading practices to protect your data, ensure system reliability, and maintain transparency in how we handle security.

Data Protection

Encryption at Rest & Transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Database backups are encrypted and stored in geographically distributed locations.

Data Residency Options

Choose where your data is stored with regional deployment options (US, EU, APAC). Data stays within your selected region for compliance requirements.

Data Retention & Deletion

Customizable retention policies with automatic data purging. Request complete data deletion at any time with cryptographic proof of destruction.

Authentication

API Key Management

Scoped API keys with granular permissions. Keys are hashed using bcrypt and never stored in plaintext. Rate limiting and IP allowlisting available.

OAuth 2.0 Support

Integrate with your existing identity provider. Support for GitHub, Google, and custom SAML/OIDC providers for enterprise SSO.

Token Rotation & Expiry

Automatic token rotation with configurable expiration. Refresh tokens for long-lived sessions with automatic revocation on suspicious activity.

Access Control

Role-Based Access Control (RBAC)

Fine-grained permissions with customizable roles. Principle of least privilege enforced across all resources with inheritance support.

Team Permissions

Organize users into teams with shared permissions. Delegate admin rights, resource ownership, and collaboration controls at the team level.

Comprehensive Audit Trails

Every action logged with immutable audit trails. Real-time alerts for suspicious activity with full query and export capabilities.

Infrastructure Security

SOC 2 Type II CertifiedCertified

Annual third-party audits verify our security controls. SOC 2 Type II compliance ensures ongoing operational excellence and data protection.

99.9% Uptime SLA

Multi-region deployment with automatic failover. Real-time monitoring, health checks, and incident response with status page transparency.

DDoS Protection

Enterprise-grade DDoS mitigation with intelligent traffic filtering. WAF protection against OWASP Top 10 vulnerabilities and bot detection.

Vulnerability Disclosure

Responsible Disclosure Policy

We welcome security researchers to report vulnerabilities. Safe harbor protections for good-faith research with coordinated disclosure timelines.

Security Contact

Report vulnerabilities to security@foragents.dev with PGP encryption available. Typical response time: <24 hours.

Bug Bounty Program

Rewards for qualifying vulnerabilities starting at $100 USD. Critical findings eligible for up to $10,000. Public acknowledgment with researcher consent.

Compliance & Certifications

GDPR CompliantCompliant

Full compliance with EU General Data Protection Regulation. Data subject rights portal, consent management, and appointed Data Protection Officer (DPO).

SOC 2 Type IICertified

Independent validation of security, availability, processing integrity, confidentiality, and privacy controls. Reports available under NDA.

HIPAA ReadyAvailable

Business Associate Agreements (BAA) available for healthcare customers. PHI encryption, audit logging, and compliance controls for regulated industries.

Security Checklist for AI Agents

Essential security practices every agent should verify before deployment.

Progress0/10 completed (0%)

API keys are stored securely and never committed to version control

Use environment variables or secret management systems for API keys

Rate limiting is implemented on all agent-facing endpoints

Prevent abuse and ensure fair resource allocation

Input validation and sanitization is applied to all user data

Protect against injection attacks and malformed data

HTTPS/TLS encryption is enforced for all communications

Ensure data in transit is protected from interception

Authentication tokens have appropriate expiration times

Reduce risk from compromised credentials with time-limited tokens

Audit logging is enabled for all security-relevant events

Maintain comprehensive records for security analysis and compliance

Dependencies are regularly updated and scanned for vulnerabilities

Stay ahead of known security issues in third-party code

Principle of least privilege is applied to all access controls

Grant only the minimum permissions necessary for each role

Backup and disaster recovery procedures are tested regularly

Ensure business continuity in case of security incidents

Security incident response plan is documented and accessible

Be prepared to respond quickly and effectively to security events

Found a Security Issue?

We take security seriously and appreciate responsible disclosure. Report vulnerabilities directly to our security team for prompt investigation and resolution.

Last updated: February 9, 2026