Security at ClawPulsar

Data Handling

ClawPulsar processes webhook relay data, uptime health checks, and budget alert thresholds. Webhook payloads are forwarded in real-time and not stored after successful delivery. Failed deliveries are queued with encrypted payloads and retried for up to 72 hours before being purged.

Encryption

All data is encrypted in transit (TLS 1.3) and at rest (AES-256). API keys and credentials are stored using industry-standard secret management.

Infrastructure

Hosted on European infrastructure. Application containers are isolated per deployment. No shared tenancy between customers.

Access Control

Webhook relay endpoints use HMAC signature verification. Uptime monitoring probes are authenticated per agent. Budget alert configurations are scoped per workspace with admin-only modification. Firewall tunneling connections use mutual TLS authentication.

Compliance Roadmap

  • SOC 2 Type I — targeting Q3 2026
  • GDPR — compliant by design (EU hosting, data minimization, right to deletion)

Responsible Disclosure

Found a vulnerability? Email security@clawpulsar.com. We respond within 48 hours.

Questions

For security inquiries, contact security@clawpulsar.com.