Last updated Β· April 29, 2026
Security
Open Bee AI is built by engineers who've shipped at scale and read too many post-mortems. Here's the honest state of our security posture and where we're going.
1. Architecture
- Workspace isolation. Every database query carries a
workspaceIdfilter. Membership is checked server-side via a singlerequireWorkspace()helper β no route bypasses it. - Server-only boundaries. Files importing
server-onlycan never be bundled into client JS. Provider API keys live exclusively in server contexts. - Local-first agent runtime. The Apache-2.0
open-beedaemon runs on your hardware. Linked workspaces dispatch tasks to your daemon β code, files, and tool outputs never traverse our cloud.
2. Encryption
- In transit. TLS 1.2+ with HSTS for all surfaces. Database connections require
sslmode=requirewith channel binding. - At rest (storage layer). Neon Postgres encrypts all data with AES-256.
- At rest (application layer). Sensitive fields β Telegram bot tokens, webhook secrets, BYOK provider keys β are additionally encrypted with AES-256-GCM using a key held only in our environment configuration. A database snapshot alone cannot decrypt them.
- API keys. Daemon keys (
obee_β¦) are stored as SHA-256 hashes. The plaintext value is shown exactly once at creation and cannot be recovered if lost.
3. Authentication & access
- Authentication via Clerk with optional 2FA per user.
- Workspace roles:
owner,admin,member. Settings, billing, and bridges require admin or owner. - Daemon authentication via Bearer tokens, scoped to a single workspace and revocable from the UI.
- Stripe webhooks are signature-verified; replay protection via the
ProcessedStripeEventidempotency table. - Telegram webhooks are verified via the
X-Telegram-Bot-Api-Secret-Tokenheader before any work is done.
4. Operational security
- Hosted on Vercel (web) and Neon (database). Both providers maintain SOC 2 Type II reports we share under NDA on request.
- Server logs retained 30 days. Logs scrub authorization headers and API keys.
- Production deploys gated on green CI: typecheck, build, and lint must pass before merge.
- Dependencies updated monthly via Renovate. Critical CVEs patched within 72 hours of disclosure.
5. What we're working on
Honest list of gaps we know about and are closing:
- SOC 2 Type I β targeted Q3 2026 with Vanta.
- Audit log of data access β who viewed which conversation when. In design.
- Customer-managed encryption keys (CMEK) β for enterprise customers who want to hold the key themselves.
- EU data residency option β Neon Frankfurt region when we have enough EU customers to justify the cluster.
6. Vulnerability disclosure
Found something? Email security@openbee.ai. Please:
- Give us 90 days before public disclosure.
- Don't access data that isn't yours. Test against accounts you control.
- Don't run denial-of-service or social-engineering tests against our staff.
We acknowledge reports within 2 business days. Valid critical/high findings receive a bounty (USD $250β$5,000 scaled by severity) and a public credit (with your consent) on this page.
7. Incident response
If a breach occurs that affects your data, we will notify you within 72 hours of confirmation, in line with GDPR Article 33. Notice includes: what happened, what data was involved, and what we did about it.