Security

Trust Center

Transparency on security, privacy, and reliability at oxom.

Status & Highlights

Security
In progress
Security requirements are considered in architecture, operations, and releases.
Privacy
In progress
We aim to keep data access limited to the minimum necessary scope.
Data residency
Implemented
Where possible and available from the provider, we prefer EU-near infrastructure.
Access control
Implemented
Authentication, role modeling, and workspace scoping are built into the product.
Encryption
Implemented
Traffic uses TLS. At-rest encryption is provided by infrastructure vendors.
Incident response
Active
Security reports are triaged in priority order; target time to first acknowledgment is 72 hours.

Controls & Measures

Identity & access
Authentication (Clerk)

Access to protected areas runs through Clerk authentication.

Implemented
Role model

Access is segmented through roles such as Admin, Editor, and Member.

Implemented
Least privilege

Permissions stay as narrow as possible relative to workspace and task context.

In progress
Application security
Change review

Changes are reviewed before they are published.

In progress
Dependency hygiene

Dependencies are monitored and updated continuously.

In progress
Rate limiting & abuse prevention

Additional guardrails for abuse-prone endpoints are planned.

Planned
Privacy & safeguards
Transport encryption

Platform connections are designed around HTTPS/TLS.

Implemented
Backups

Backup capabilities are primarily provided by our infrastructure vendors.

Implemented
Audit logging

Expanded security audit logs for more transparency are planned.

Planned
Multi-tenancy isolation
Workspace isolation

Data access is constrained through workspace scoping and Supabase RLS policies.

Implemented
Domain separation

Platform, subdomain, and custom-domain routing follows a tenant resolution model.

Implemented

Security Advisories

OXOM-2026-001

Vault Decrypt Secret — Unauthenticated API Access
High

An internal database function for decrypting stored API credentials was accessible without authentication via the REST API. Access has been restricted to server-side service role only. No evidence of unauthorized access was found.

Reported: 03 May 2026Fixed: 03 May 2026

Sub-processors

Current Providers
This list shows key external providers in the current production environment and is subject to change.
VendorPurposeLocationLink
VercelHosting and edge deliveryEU/US (provider dependent)vercel.com
SupabasePostgres database and platform servicesEU/US (provider dependent)supabase.com
ClerkAuthentication and session managementEU/US (provider dependent)clerk.com
AnthropicAI featuresVarieswww.anthropic.com/
OpenAIAI featuresVariesopenai.com
DubLink infrastructureVariesdub.co
LiveblocksCollaborationEU/US (provider dependent)liveblocks.io
CloudflareObject storage (R2)EU/US (provider dependent)www.cloudflare.com/
StripePayments and billingEU/US (provider dependent)stripe.com
DeepLTranslation and language processingEU/US (provider dependent)www.deepl.com/en
ElevenLabsText to speechVarieselevenlabs.io
UpstashRedis-based rate limitingEU/US (provider dependent)upstash.com
DiscordCommunity and announcement integrationsVariesdiscord.com
TwitchCommand and bot integrationsVarieswww.twitch.tv/
LinearIssue tracking and internal ticketingVarieslinear.app
BufferSocial scheduling and publishingVariesbuffer.com

Vulnerability Disclosure

Security Reports
Please send security reports to security@oxom.de.

Please include the affected URL, reproduction steps, and expected impact.

No disruption to production systems and only the minimum necessary data access.

Response Goals

  • Initial acknowledgment within 72 hours.
  • Critical: target first mitigation within 72 hours.
  • High: target remediation within 7 days.
  • Medium: target remediation within 30 days.
  • Low: target remediation within 90 days.

Safe Harbor: good-faith, responsible reports are supported, provided testing is legal, non-destructive, and kept to a limited scope.

FAQs

Where is my data stored?

Data sits with selected infrastructure providers. Where sensible and available, we prefer EU-near deployments.

How do you separate workspaces?

Workspace data is isolated at the application layer and through Supabase Row-Level Security (RLS).

Does oxom support custom domains?

Yes. Subdomains and custom domains are part of the platform's domain mapping model.

How can I report a security issue?

Please email security@oxom.de and include the affected URL, reproduction steps, and possible impact.

Do you run a bug bounty program?

A public bug bounty program is not currently announced. Coordinated disclosure is available via the security contact.

Do you support SSO?

A public SSO status is not separately documented yet. Please contact support for the current state.

How do you handle AI data?

AI features may use external model providers. We aim to send only the necessary data and minimize scope.

How quickly do you respond to security reports?

The target is an initial acknowledgment within 72 hours and prioritized remediation by severity.

Last updated: February 22, 2026