Security is architecture, not an afterthought. Every layer of Saltare — from database constraints to AI guardrails — is designed to keep your workspace data where it belongs.
Saltare uses acts_as_tenant to enforce workspace scoping at the ORM layer. Every query is automatically filtered by workspace_id. There is no way to access another workspace's data through normal application paths.
AI research tools (fetch_url, web_search) validate every outbound URL through AI::UrlValidator before making any request. Private IP ranges are unconditionally blocked.
Authentication is built on has_secure_password (bcrypt). No third-party auth gems. Session cookies are hardened against common web attacks.
AI agents that interact with user-supplied content are a natural prompt injection surface. Saltare applies multiple layers of protection so agents can't be hijacked by malicious data.
Controls audit underway. Target: Q4 2026.
Data deletion and portability endpoints available. DPA on request.
BAA and technical safeguards on the roadmap for enterprise tier.
We take security reports seriously. If you discover a vulnerability in Saltare, please report it to us privately before public disclosure. We aim to triage within 48 hours and provide a fix timeline within 7 days.
We don't pursue legal action against good-faith researchers. We will acknowledge your contribution in our release notes unless you prefer anonymity.
Report a vulnerability