Initializing Operalta...
Last Updated: March 16, 2026
For a high-level overview of our security practices, see the Security overview page.
This document describes Operalta's security architecture, controls, and commitments in detail. It supplements our Terms of Service and Privacy Policy.
Beyond provider-managed encryption, sensitive credentials are handled through protected backend flows and are not exposed to the browser by default.
Database policies are a core part of our isolation model, but they are not the only control. Company-scoped product data is protected by a combination of database policies, route-level access checks, and tightly constrained elevated backend flows.
company_id scoping for company-scoped reads and writes where applicableBeyond row-level isolation, role and context checks ensure that each user can only perform actions permitted within the company context they actually hold.
SECURITY DEFINER functions (is_company_member_with_role()) to prevent RLS recursiontimingSafeEqual)Security-critical routes (authentication, token endpoints) operate in a fail-closed mode: if the rate-limit store is unavailable, requests return 503 Service Unavailable rather than passing through without rate limiting.
Selected Operalta agent and automation surfaces can access files, run commands, and fetch external content on your behalf. These capabilities are sandboxed and controlled, and they inherit the same company-bound access model as the rest of the platform.
../../) are blocked at validationFor exact deletion windows, request timelines, and backup treatment, refer to our Privacy Policy and the applicable account or request workflow.
SOC 2 Type II: Operalta SOC 2 Type II certification is currently in progress. Core infrastructure providers maintain independent SOC 2 Type II certifications or equivalent audits.
No data selling: We never sell your data. Approved AI providers do not use your data to train third-party models. Provider retention and logging behavior follow their contracts, DPAs, and published terms.
If you believe you have found a security vulnerability in Operalta, please report it to us immediately.
Email: security@operalta.com
Please include detailed steps to reproduce the vulnerability, including the affected URL, request/response details, and any proof-of-concept code. We commit to acknowledging reports within 48 hours and working with security researchers to resolve issues quickly.
We appreciate responsible disclosure and will not take legal action against researchers who report vulnerabilities in good faith and comply with these guidelines:
For questions about our security practices, contact security@operalta.com
Security overview · Terms of Service · Privacy Policy
Sub-processor information is available on request via privacy@operalta.com.