Security

Security at DarkMatter

DarkMatter is infrastructure for AI audit trails. Security is not a feature — it is the foundation. This page describes our controls, shared responsibilities, and the documents available for your security review team.

Documents for your team

Legal and Compliance Overview
For Legal, Compliance, and DPO teams. Covers regulatory alignment (EU AI Act, US state laws, financial sector), data handling, retention policies, and the independence guarantee.
Download PDF →
Information Security Overview
For InfoSec and CISO teams. Covers encryption controls, authentication model, rate limiting, SSRF protection, shared responsibility model, and incident response.
Download PDF →

Security controls

Encryption in transit
TLS 1.3 enforced on all API endpoints and dashboard traffic. No unencrypted connections accepted.
Encryption at rest
All data encrypted at rest via Supabase managed AES-256 encryption.
BYOK encryption
Client-provided AES-256-GCM key, available on all plans. DarkMatter stores only ciphertext. Your key is never stored on our systems.
Tamper-evident chain
SHA-256 parent hash chaining. Modifying any commit breaks every downstream hash — detectable without trusting DarkMatter.
Authentication
Supabase JWT for dashboard. Bearer token API keys for agents. Keys hashed at rest, never stored in plaintext.
Rate limiting
Per-endpoint limits: auth 20 req/15min, API 120 req/min, feedback 5 req/hr.
SSRF protection
Webhook URLs validated against blocklist of private IP ranges, loopback, and cloud metadata endpoints.
Security headers
helmet.js: HSTS, X-Frame-Options, X-Content-Type-Options, referrer policy.
Row-level security
Supabase RLS policies enforce tenant isolation at the database layer. Users can only access their own agents and commits.
Input sanitization
All user input sanitized and length-limited before processing or storage. HTML injection prevented.
W3C DID identity
Cryptographically verifiable agent identities. Audit trails independently verifiable without trusting DarkMatter.
SOC 2 Type 2 In progress
Working toward SOC 2 Type 2 certification. Expected completion 2027. Contact us for current security posture documentation.

Shared responsibility model

Security is a shared responsibility between DarkMatter and our customers.

ResponsibilityDarkMatterCustomer
Platform infrastructure and hosting securityYes
Encryption in transit and at restYes
Database security and backupsYes
Rate limiting and DDoS mitigationYes
API key hashing and secure storageYes
Tamper-evident hash chain integrityYes
BYOK key custody, storage, and rotationCustomer
Agent API key rotation and revocationCustomer
Secure storage of API keys in customer systemsCustomer
Content and classification of committed payloadsCustomer
Agent authorization and access control logicCustomer
Network security for self-hosted deploymentsCustomer

Sub-processors

DarkMatter uses the following third-party sub-processors. Enterprise customers with specific data residency requirements should consider the self-hosted deployment option.

ProviderPurposeRegion
SupabasePostgreSQL database and authenticationUS (AWS us-east-1)
RailwayApplication hosting and deploymentUS
ResendTransactional email (confirmation, notifications)US
CloudflareDNS, CDN, and DDoS mitigationGlobal edge

Certifications and compliance

SOC 2 Type 2
In progress
Audit period expected to begin Q1 2027. Contact us for current security documentation.
EU AI Act alignment
Supported
DarkMatter's audit trail architecture is designed to support Art. 12 and 19 logging requirements.
GDPR
Supported
Data export and deletion available at any time.

Vulnerability disclosure and contact

To report a security vulnerability, email [email protected] with a description and reproduction steps.

For security review requests, vendor questionnaires, contact