Security & compliance

Honest answers about how we
protect your data.

We're an indie team and we don't hide behind marketing copy. Below: every control we have in place today, what's actively being built (SOC 2 Type I in progress with Vanta), and what's on the roadmap. Every entry links back to a real implementation choice or a public partner page.

For procurement and security questionnaires, email support@mcpspend.com — we typically reply within one business day.

Data protection

Encryption in transit

In place

All HTTP/HTTPS traffic uses TLS 1.2+. Cipher suites enforced by Caddy at the edge.

Encryption at rest — secrets

In place

Sensitive config (Slack webhooks, future PATs) encrypted with AES-256-GCM, keyed by APP_ENCRYPTION_KEY on the API server.

Encryption at rest — database

In place

Postgres volume on encrypted disk at the hosting provider.

API key hashing

In place

API keys stored as SHA-256 hashes only. We cannot recover a key — only revoke and reissue.

Password hashing

In place

bcrypt with cost factor 12.

No tool arguments collected

In place

Our proxy reports only metadata (tool name, server name, latency, payload size). Tool arguments and responses never leave your machine.

Hosting & isolation

EU-hosted infrastructure

In place

Servers in Hostinger EU data centers. All data — DB, Redis, logs — stays in the EU.

Per-organization data isolation

In place

Every API endpoint scopes by organizationId. No cross-tenant data leak possible at the query layer.

Stripe — no card data on our servers

In place

Stripe Checkout collects all card data; we receive only a customer ID. SOC 2 / PCI DSS Level 1 inherited from Stripe.

Dedicated single-tenant deployment

On roadmap

Available for Enterprise. Separate VPS + database, your own subdomain.

Compliance

GDPR-aligned

In place

EU-hosted, anonymous compat telemetry, opt-in cookies, DPIA available on request. Privacy Policy details data subject rights.

SOC 2 Type I

In progress

Audit started Q4 2026 with Vanta. Type II expected Q2 2027.

ISO 27001

On roadmap

Roadmap H2 2027 after SOC 2 Type II.

DPA (Data Processing Agreement)

In place

Available for Enterprise customers on request — signed within 5 business days.

HIPAA / PHI

On roadmap

MCPSpend is not currently designed to process PHI. Email support if you need a BAA — we can scope a dedicated deployment.

Operations

Daily Postgres backups

In place

Encrypted snapshots to S3-compatible storage (R2). 30-day retention. Restore drill quarterly.

Public status page

In place

mcpspend.com/status — live probes against API, MCP HTTP endpoint, dashboard, npm, Open VSX, Smithery.

Audit log

In place

Append-only record of sensitive actions (billing changes, member changes, key revoke). Available in the dashboard for Team+ plans.

Sub-processors disclosed

In place

Full list with purpose and geography below.

Incident notification SLA

In place

Within 72 hours per GDPR Art. 33 for any data-breach involving personal data.

Sub-processors

Third parties that process data on our behalf. Listed for GDPR transparency (Art. 28). Enterprise customers receive notification before we add a new sub-processor.

Sub-processorPurposeData shared
Hostinger (EU region)Application + database hosting (VPS)All MCPSpend data
Stripe (US/EU, GDPR + DPA in place)Payment processingCustomer email, billing address, card via Stripe (we never see card data)
Resend (US, GDPR + DPA in place)Transactional email deliveryRecipient email and the body of messages we send (magic links, alerts, digests)
Cloudflare R2 (EU region)Encrypted backup storagePostgres dumps, encrypted
Google Analytics 4 (US)Marketing-page traffic analytics, opt-in onlyAnonymised IP, page URL, referrer

Responsible disclosure

Found a security issue? Email security@mcpspend.com with reproduction steps. We acknowledge within 48 hours and aim to remediate critical findings within 7 days. We don't run a paid bug bounty yet — we'll credit you publicly with permission and gift Pro plan years to thank you.