We're an indie team and we don't hide behind marketing copy. Below: every control we have in place today, what's actively being built (SOC 2 Type I in progress with Vanta), and what's on the roadmap. Every entry links back to a real implementation choice or a public partner page.
For procurement and security questionnaires, email support@mcpspend.com — we typically reply within one business day.
All HTTP/HTTPS traffic uses TLS 1.2+. Cipher suites enforced by Caddy at the edge.
Sensitive config (Slack webhooks, future PATs) encrypted with AES-256-GCM, keyed by APP_ENCRYPTION_KEY on the API server.
Postgres volume on encrypted disk at the hosting provider.
API keys stored as SHA-256 hashes only. We cannot recover a key — only revoke and reissue.
bcrypt with cost factor 12.
Our proxy reports only metadata (tool name, server name, latency, payload size). Tool arguments and responses never leave your machine.
Servers in Hostinger EU data centers. All data — DB, Redis, logs — stays in the EU.
Every API endpoint scopes by organizationId. No cross-tenant data leak possible at the query layer.
Stripe Checkout collects all card data; we receive only a customer ID. SOC 2 / PCI DSS Level 1 inherited from Stripe.
Available for Enterprise. Separate VPS + database, your own subdomain.
EU-hosted, anonymous compat telemetry, opt-in cookies, DPIA available on request. Privacy Policy details data subject rights.
Audit started Q4 2026 with Vanta. Type II expected Q2 2027.
Roadmap H2 2027 after SOC 2 Type II.
Available for Enterprise customers on request — signed within 5 business days.
MCPSpend is not currently designed to process PHI. Email support if you need a BAA — we can scope a dedicated deployment.
Encrypted snapshots to S3-compatible storage (R2). 30-day retention. Restore drill quarterly.
mcpspend.com/status — live probes against API, MCP HTTP endpoint, dashboard, npm, Open VSX, Smithery.
Append-only record of sensitive actions (billing changes, member changes, key revoke). Available in the dashboard for Team+ plans.
Full list with purpose and geography below.
Within 72 hours per GDPR Art. 33 for any data-breach involving personal data.
Third parties that process data on our behalf. Listed for GDPR transparency (Art. 28). Enterprise customers receive notification before we add a new sub-processor.
| Sub-processor | Purpose | Data shared |
|---|---|---|
| Hostinger (EU region) | Application + database hosting (VPS) | All MCPSpend data |
| Stripe (US/EU, GDPR + DPA in place) | Payment processing | Customer email, billing address, card via Stripe (we never see card data) |
| Resend (US, GDPR + DPA in place) | Transactional email delivery | Recipient email and the body of messages we send (magic links, alerts, digests) |
| Cloudflare R2 (EU region) | Encrypted backup storage | Postgres dumps, encrypted |
| Google Analytics 4 (US) | Marketing-page traffic analytics, opt-in only | Anonymised IP, page URL, referrer |
Found a security issue? Email security@mcpspend.com with reproduction steps. We acknowledge within 48 hours and aim to remediate critical findings within 7 days. We don't run a paid bug bounty yet — we'll credit you publicly with permission and gift Pro plan years to thank you.