Last updated 2026-05-08

Security, privacy, and trust at Revelir.

Revelir is an AI platform for customer operations. This page summarizes the safeguards, standards, and providers that support the confidentiality, integrity, and availability of customer data.

Controls

Operational across the product, the underlying platform, and the engineering team.

Updated 2026-05-08

Infrastructure security

  • Cloudflare Web Application Firewall in Block mode covering OWASP Top 10 and known malicious IP and bot signatures
  • Cloudflare Full (strict) TLS — origin-side certificate validation prevents downgrade and man-in-the-middle scenarios
  • Per-IP and per-account rate limiting on authentication, ingestion, and public APIs — enforced at the Cloudflare edge and at the origin
View 4 more infrastructure security controls

Product security

  • Schema-validated input at every HTTP request handler, queue consumer, and external integration boundary
  • OWASP Top 10 static analysis on every pull request — merges blocked on policy violations
  • Dependency vulnerability scanning on every pull request — merges blocked on Critical and High severity findings
View 6 more product security controls

Data and privacy

  • Encryption in transit using TLS across all external and internal connections
  • Encryption at rest provided by the underlying database and object storage platforms using industry-standard algorithms
  • Object storage configured with public access blocked at the bucket level; reads gated by IAM credentials over HTTPS
View 3 more data and privacy controls

Organizational security

  • Multi-factor authentication enforced on every production-access account across all infrastructure providers
  • Privileged access restricted to the lead engineering team
  • Quarterly access reviews; departure-triggered access removal verified before the departure is closed
View 2 more organizational security controls

Internal security procedures

  • Defined incident response lifecycle: triage, contain, eradicate, recover, document
  • Automated daily database snapshots with 7-day retention; Point-in-Time Recovery to 2-minute granularity available on demand
  • Quarterly internal security review with dated evidence records and risk-register update
View 5 more internal security procedures controls

Sub-processors

Third-party providers that process customer data on Revelir's behalf. A Data Processing Agreement is executed with each provider where applicable.

VendorPurposeData residency
CloudflareCDN, WAF, DNS, Workers compute, R2 object storage, D1 database, KV cacheGlobally distributed
SupabasePostgreSQL database, authenticationSingapore (ap-southeast-1)
AWSS3 object storageSingapore (ap-southeast-1)
RenderBackend service hostingProvider-managed
VercelFrontend deployment hostingGlobally distributed
Google CloudVertex AI Gemini inference (paid tier)United States (us-central1)
OpenAILLM inference (paid commercial tier)Provider-managed
AnthropicLLM inferenceProvider-managed
Voyage AIEmbedding inferenceProvider-managed
QdrantVector searchProvider-managed
LangfuseLLM observabilityProvider-managed
ClickHouseAnalytics and event storageProvider-managed
InfisicalCentralized secrets managementProvider-managed
SentryApplication observability and error monitoringProvider-managed

Report a vulnerability

Revelir welcomes coordinated disclosure from external security researchers. Reports submitted to our security team will be acknowledged within two business days.

security@revelir.ai

Request documentation

The Information Security Policy, Data Processing Agreements, and current sub-processor list are available to customers and prospective customers under mutual non-disclosure.

Request documentation