Security Overview
Security is a top priority at Assisters. We implement industry-standard practices to protect your data and ensure reliable API access.Infrastructure Security
Encryption in Transit
All API traffic uses TLS 1.3 encryption
Encryption at Rest
Data encrypted with AES-256
DDoS Protection
Automatic mitigation via Cloudflare
SOC 2 Compliant
Annual third-party audits
API Security
Authentication
All requests require Bearer token authentication:- Prefixed with
ask_for easy identification - Hashed using SHA-256 before storage
- Can be restricted to specific domains
- Instantly revocable
Rate Limiting
Protect against abuse with tiered rate limits:| Tier | Requests/Minute | Tokens/Minute |
|---|---|---|
| Free | 10 | 100,000 |
| Developer | 100 | 1,000,000 |
| Startup | 500 | 5,000,000 |
Request Validation
All inputs are validated:- JSON schema validation
- Maximum input sizes enforced
- Malformed requests rejected with clear errors
Data Privacy
What We Store
| Data Type | Retention | Purpose |
|---|---|---|
| API requests | 30 days | Debugging, abuse detection |
| Usage metrics | 90 days | Billing, analytics |
| Account data | Account lifetime | Service delivery |
| Payment info | Handled by Stripe | Billing |
What We Don’t Do
- ❌ We don’t train on your data
- ❌ We don’t sell your data
- ❌ We don’t share data with third parties (except as required by law)
- ❌ We don’t store API responses permanently
Data Processing
Content Safety
Built-in Protections
- Input Moderation: Optional content filtering on user inputs
- Output Validation: Responses can be moderated before delivery
- Prompt Injection Detection: Blocks common attack patterns
Content Moderation
Learn how to implement content moderation
Prompt Injection
Protect against prompt injection attacks
Compliance
Certifications
- SOC 2 Type II: Annual audit
- GDPR: EU data protection compliance
- CCPA: California consumer privacy compliance
Data Residency
API requests are processed in:- Primary: US-East (AWS us-east-1)
- Failover: US-West (AWS us-west-2)
Security Best Practices
API Key Management
Secure Integration
Backend Proxy
For web applications, route requests through your backend:Incident Response
Reporting Security Issues
If you discover a security vulnerability:- Email: [email protected]
- Do not disclose publicly before we’ve addressed it
- We’ll acknowledge within 24 hours
- Critical issues receive priority attention
Status & Incidents
Monitor service status at status.assisters.dev:- Real-time status
- Incident history
- Scheduled maintenance
- Email notifications
Enterprise Security
Additional features for Enterprise customers:| Feature | Description |
|---|---|
| SSO | SAML-based single sign-on |
| Custom Data Retention | Configure retention periods |
| Dedicated Instances | Isolated infrastructure |
| Audit Logs | Detailed access logs |
| IP Allowlisting | Restrict API access by IP |
| BAA | Business Associate Agreement (HIPAA) |
Contact Enterprise Sales
Learn about enterprise security features
Security Checklist
Use environment variables for API keys
Enable domain restrictions for client-side keys
Implement content moderation for user inputs
Route browser requests through a backend proxy
Monitor usage for anomalies
Rotate API keys regularly
Review our security updates in the changelog