Trust Center
Security, compliance, and data protection at Snipara
Last updated: February 2026
Our Security Commitments
1. Security Overview
Snipara is a Context Optimization as a Service platform operated by STARBOX GROUP GMBH, a Swiss-registered company (CHE-326.317.262). We process your documentation to deliver optimized context to your own LLM — we never run inference on your data, never train models on it, and never share it with third parties.
Security is foundational to our architecture. Because our service sits between your documentation and your AI tools, we treat every document, query, and session as confidential by default.
Index, search, rank, and compress your documentation into optimized context chunks within your token budget.
Run LLM inference on your data, train AI models, sell or share your content with third parties, or access your documents without explicit permission.
2. Encryption & Data Protection
All data is encrypted both in transit and at rest using industry-standard cryptographic protocols.
Data in Transit
Data at Rest
Secrets Management
| Secret Type | Storage Method | Rotation |
|---|---|---|
| API Keys | SHA-256 hashed, prefixed for identification | User-initiated via dashboard |
| OAuth Tokens | Cryptographically signed JWTs | Auto-expire with configurable TTL |
| Database Credentials | Railway encrypted environment variables | Rotated per deployment |
| Webhook Secrets | HMAC-SHA256 signatures | Per-integration rotation |
3. Tenant Isolation Architecture
Snipara enforces strict multi-tenant isolation at every layer of the stack. Customer data is never co-mingled, and access boundaries are enforced at the database, application, and API layers.
Isolation Model
Every project operates in a logically isolated environment:
Enterprise Self-Hosted Isolation
Enterprise customers can deploy Snipara in their own infrastructure for complete physical isolation. Self-hosted deployments run in the customer's own VPC with their own database, eliminating any shared infrastructure. See our Self-Hosted Enterprise offering for details.
4. Authentication & Access Control
Authentication Methods
| Method | Format | Use Case | Security Level |
|---|---|---|---|
| Project API Key | X-API-Key: rlm_... | Single project MCP access | High |
| Team API Key | X-API-Key: rlm_... | Multi-project team access | High |
| OAuth 2.0 Token | Authorization: Bearer snipara_at_... | Device flow authentication | High |
| Web Session | NextAuth.js session cookie | Dashboard access (GitHub, Google, Email) | Standard |
Access Control Model
Snipara uses a role-based access control (RBAC) system with per-project granularity:
| Role | Read Docs | Write Docs | Manage Keys | Admin |
|---|---|---|---|---|
| VIEWER | Yes | No | No | No |
| EDITOR | Yes | Yes | No | No |
| ADMIN | Yes | Yes | Yes | Yes |
| NONE | No | No | No | No |
Rate Limiting & Anti-Abuse
5. Infrastructure Security
Platform Architecture
| Component | Provider | Region | Security |
|---|---|---|---|
| Web Application | Railway | EU / US | Containerized, non-root user |
| MCP Server (API) | Railway | EU / US | Docker multi-stage, health checks |
| Database | Vaultbrix (PostgreSQL) | 🇨🇠Switzerland | AES-256, TLS, automated backups |
| Vector Search | pgvector (in Vaultbrix) | 🇨🇠Switzerland | Same DB-level encryption and RLS |
| Rate Limiting | Redis (Railway) | EU / US | Encrypted connections, in-memory fallback |
| Error Tracking | Sentry | EU | API key redaction, 10% sampling |
Security Headers
Every HTTP response from our API includes security headers:
| Header | Value | Purpose |
|---|---|---|
Strict-Transport-Security | max-age=31536000 | Enforce HTTPS for 1 year |
X-Frame-Options | DENY | Prevent clickjacking |
X-Content-Type-Options | nosniff | Prevent MIME type sniffing |
X-XSS-Protection | 1; mode=block | XSS filter |
Content-Security-Policy | default-src 'self' | Restrict resource loading |
Referrer-Policy | strict-origin-when-cross-origin | Limit referrer information |
Docker Security
Error Sanitization
All error responses are sanitized before being returned to clients. Internal error details, stack traces, and system information are never exposed. Only 11 pre-defined safe error messages are returned, preventing information leakage.
6. Compliance & Certifications
Current Compliance
| Standard | Status | Details |
|---|---|---|
| GDPR (EU General Data Protection Regulation) | Compliant | Full compliance including DPA, data subject rights, lawful basis, breach notification |
| Swiss FADP (Federal Act on Data Protection) | Compliant | Swiss-registered company (CHE-326.317.262) with full FADP compliance |
| CCPA (California Consumer Privacy Act) | Compliant | No sale of personal information, right to delete, right to know |
| SOC 2 Type II | Planned 2026 | Audit engagement planned — controls aligned with Trust Services Criteria |
| ISO 27001 | Roadmap | Information Security Management System certification on roadmap |
No AI Training Commitment
Legally Binding: Your Data is NEVER Used for AI Training
This commitment is documented in our Privacy Policy (Section 6) and Terms of Service (Section 6), and constitutes a legally binding obligation:
7. Data Residency & Storage
Snipara stores and processes data exclusively in Switzerland on our self-hosted infrastructure. This provides the strongest data protection available, outside US jurisdiction.
Swiss Data Sovereignty
All customer data is stored in Switzerland, providing:
Primary Data Locations
| Data Type | Location | Provider | Retention |
|---|---|---|---|
| Documents & embeddings | 🇨🇠Switzerland | Vaultbrix DBaaS | Until deletion requested |
| User accounts | 🇨🇠Switzerland | Vaultbrix DBaaS | Until account deletion |
| API keys (hashed) | 🇨🇠Switzerland | Vaultbrix DBaaS | Until revoked |
| Audit logs | 🇨🇠Switzerland | Vaultbrix DBaaS | 90 days |
| Application logs | EU / US | Railway + Sentry | 30 days |
| Payment data | US (Stripe) | Stripe (PCI DSS Level 1) | Per Stripe policies |
Third-Party Sub-Processors
| Sub-Processor | Purpose | Data Center | Safeguards |
|---|---|---|---|
| Vaultbrix | Database hosting (Swiss cloud) | 🇨🇠Switzerland | SOC 2 (in progress), LPD, GDPR adequate, No Cloud Act |
| Railway | Application hosting | EU / US | SOC 2, encrypted infra |
| Stripe | Payments | US | PCI DSS Level 1, SCCs |
| Resend | Transactional email | US | SCCs, TLS encryption |
| Sentry | Error tracking | EU | SOC 2, API key redaction |
| Vercel | CDN / Edge | Global | SOC 2, GDPR DPA |
All sub-processors with data centers outside the EU/EEA operate under Standard Contractual Clauses (SCCs) and supplementary security measures as required by GDPR Chapter V.
8. Data Processing Agreement (DPA)
Snipara provides a Data Processing Agreement for all customers who require one. Our DPA is compliant with GDPR Article 28 and the Swiss FADP, and covers:
Processing scope, purpose limitation, categories of personal data, and data subject categories.
Technical and organizational measures (TOMs) including encryption, access control, monitoring, and incident response.
Complete list of sub-processors, their locations, safeguards, and notification process for sub-processor changes.
Assistance obligations for data subject requests (access, rectification, erasure, portability, restriction, objection).
Commitment to notify within 72 hours of confirmed data breach, with full incident details and remediation plan.
Data export and permanent deletion within 30 days of contract termination, including embeddings, indexes, and backups.
9. Data Lifecycle & Retention
Data at Each Stage
| Stage | What Happens | What We Store |
|---|---|---|
| Upload | Document received via MCP or REST API | Original document content, metadata |
| Indexing | Document chunked, embedded with pgvector | Chunks, embeddings (project-scoped) |
| Query | Semantic + keyword search, ranking, compression | Query logged for usage tracking (no query content stored) |
| Response | Optimized context returned to client | Nothing — response is ephemeral |
| Deletion | Account or project deleted | All data permanently purged within 30 days |
Retention Policy
| Data Type | Active Account | After Deletion Request |
|---|---|---|
| Documents & embeddings | Retained until deleted | Permanently purged within 30 days |
| API keys | Until revoked | Immediately invalidated |
| Agent memories | Per TTL or until deleted | Permanently purged within 30 days |
| Usage statistics | Aggregated, anonymized | Anonymized data may be retained |
| Audit logs | 90 days rolling | Auto-expires |
| Billing records | Per Swiss law (~10 years) | Retained per legal obligation |
10. Incident Response
Snipara maintains a structured incident response plan aligned with industry best practices. Our goal is rapid containment, transparent communication, and thorough remediation.
Response Timeline
| Phase | Timeline | Actions |
|---|---|---|
| Detection | Continuous | Automated monitoring via Sentry, audit logs, anti-scan detection, and health checks |
| Triage | < 1 hour | Classify severity (Critical/High/Medium/Low), assign incident owner, begin investigation |
| Containment | < 4 hours | Isolate affected systems, revoke compromised credentials, deploy mitigations |
| Customer Notification | < 72 hours | Notify affected customers with incident details, impact assessment, and recommended actions (per GDPR Article 33/34) |
| Remediation | Varies | Root cause analysis, permanent fix deployment, infrastructure hardening |
| Post-Mortem | < 7 days | Internal review, lessons learned, process improvements, customer summary report |
Severity Classification
| Severity | Definition | Example |
|---|---|---|
| Critical | Data breach or unauthorized access to customer data | Database exfiltration, authentication bypass |
| High | Service-wide outage or significant security vulnerability | API down, privilege escalation vulnerability |
| Medium | Partial service degradation or minor vulnerability | Elevated error rates, information disclosure |
| Low | Informational finding, no immediate impact | Configuration drift, non-critical dependency update |
11. Vulnerability Disclosure
Snipara welcomes responsible security research. If you discover a security vulnerability, we ask that you report it responsibly so we can address it promptly.
How to Report
Our Commitment
| Action | Timeline |
|---|---|
| Acknowledge receipt | Within 48 hours |
| Initial assessment | Within 5 business days |
| Status update | Within 10 business days |
| Fix deployed (critical) | Within 72 hours of confirmation |
| Fix deployed (high) | Within 14 days of confirmation |
| Fix deployed (medium/low) | Within 30 days of confirmation |
Safe Harbor
We will not pursue legal action against security researchers who act in good faith, follow responsible disclosure practices, avoid accessing or modifying other users' data, and do not disrupt our services. We ask that you give us reasonable time to address reported issues before any public disclosure.
12. Business Continuity
Backup & Recovery
Availability
Snipara targets high availability across all plans. Enterprise customers receive contractual SLA terms as part of their agreement:
| Plan | Availability Target | Support |
|---|---|---|
| Free / Pro | Best effort | Community + email |
| Team | 99.5% monthly | Priority email, 24h response |
| Enterprise | 99.9% monthly (contractual SLA) | Dedicated support, 4h response for critical |
13. Audit & Monitoring
Security Audit Logging
All security-relevant events are logged asynchronously (fire-and-forget) with structured data for analysis and alerting:
| Event Type | Trigger | Data Captured |
|---|---|---|
access.denied | Unauthorized project access attempt | IP, API key prefix, target project, timestamp |
rate_limit.exceeded | Rate limit threshold crossed | IP, API key prefix, request count, window |
scan.blocked | Enumeration attack detected | IP, denied slugs count, block duration |
auth.failed | Invalid authentication attempt | IP, auth method, failure reason |
key.created | New API key generated | User, project, key prefix |
key.revoked | API key revoked | User, project, key prefix |
acl.changed | Access control modification | User, project, old/new role |
data.deleted | Account or project data purged | User, scope, data types affected |
Monitoring & Alerting
Security Audits
Snipara conducts regular security assessments. Our most recent comprehensive audit (January 2026) covered 14 security domains and resulted in all critical findings being remediated. Enterprise customers may request audit summaries as part of their procurement process.
14. Employee Access & Training
15. Security Roadmap
Security is an ongoing investment. We are continuously improving our posture and working toward additional certifications:
| Initiative | Status | Details |
|---|---|---|
| SOC 2 Type II Audit | In Progress | Audit engagement initiated, controls aligned with Trust Services Criteria |
| ISO 27001 Certification | Planned | ISMS framework development and certification on roadmap |
| External Penetration Testing | Recurring | Periodic third-party penetration testing engagements |
| Bug Bounty Program | Planned | Formal bug bounty program under evaluation for launch alongside SOC 2 |
| SIEM Integration | Planned | Enterprise customers will receive real-time security event forwarding to their SIEM |
| Customer-Managed Encryption Keys | Planned | Bring-your-own-key (BYOK) support for Enterprise self-hosted |
16. Contact Security Team
We take security seriously and welcome communication from customers, researchers, and the community.
STARBOX GROUP GMBH
Chemin du Pré-Guillot 9
1288 Aire-la-Ville, Switzerland
CHE-326.317.262
We aim to respond to all security inquiries within 48 hours.
Questions about security? Contact security@starbox-group.com