Enterprise-grade protection for your user data. Built on a foundation of zero-trust architecture.
We recognize the sensitivity of research data and guarantee that any data you upload to Pathmode always remains yours.
Your data will only ever be used to provide you with our services and never for training AI models for other customers.
Multiple layers of security protect your data at every stage

HTTPS / TLS 1.3
DDoS Protection
RLS Policies & Encryption
Stateless Inference
Comprehensive security measures to protect your data
AES-256 Encryption at Rest & TLS 1.3 in Transit
All data is encrypted using industry-standard AES-256 at rest and TLS 1.3 in transit. API keys and sensitive credentials are never exposed client-side.
Multi-Factor Security with Strong Passwords
Strict access control: All application access requires a verified account. Anonymous or guest access is strictly prohibited.
XSS Protection & Secure Resource Loading
Strict CSP headers prevent cross-site scripting (XSS) attacks and ensure only trusted resources are loaded. All user inputs are validated and sanitized.
Comprehensive Sanitization & Validation
All user inputs are validated for type, length, and format. HTML content is sanitized using DOMPurify to prevent injection attacks.
Server-Side Processing with Zero Retention
AI API calls are processed server-side with API keys never exposed. AI-generated content is processed without storing your prompts or responses.
DoS Protection & Abuse Prevention
API endpoints are protected with rate limiting to prevent abuse and ensure fair usage. Limits are enforced per user and IP address.
Row-Level Security & Role-Based Access
Authenticated-Only Access: Zero-trust approach where every request is authenticated. Workspace restrictions ensure complete data isolation.
Point-in-Time Recovery Enabled
Automated daily backups with point-in-time recovery capabilities for data protection and disaster recovery.
Industry-standard security headers and regulatory compliance
Full compliance with EU General Data Protection Regulation
Note: Aligned with ISO 27001 standards; formal certification in progress.
Your data, your control
Personal data is automatically detected and anonymized before processing. We ensure PII is stripped to protect individual privacy.
Data is stored in AWS regions (via Supabase) with configurable geographic locations. Default: EU-based infrastructure.
You control your data. Delete your account or workspace at any time. Data is permanently removed within 30 days of deletion.
Export your data anytime. Contact us for a complete data export in machine-readable format.
Trusted partners who help us deliver Pathmode
We work with trusted third-party service providers to deliver Pathmode. All sub-processors are bound by strict data processing agreements.
Infrastructure and AI services
Database and authentication services
Hosting and edge network
We take security seriously and appreciate responsible disclosure
We take security seriously and appreciate responsible disclosure of security vulnerabilities.
We will acknowledge receipt within 48 hours and work with you to resolve the issue.
Structured process for handling security incidents
In the event of a security incident, we follow a structured response process:
Continuous monitoring and automated alerts help us detect incidents quickly.
Immediate steps to contain the threat and remove it from our systems.
Restore services and conduct post-incident review to prevent recurrence.
Affected users will be notified within 72 hours of confirmed incidents, per GDPR requirements.
Continuous improvement and proactive security measures
We regularly audit dependencies for known vulnerabilities and apply security patches promptly. Automated dependency scanning helps identify issues early.
Continuous monitoring of API usage, authentication attempts, and system logs helps us detect and respond to threats in real-time.
We conduct regular security reviews and code audits to identify and address potential vulnerabilities proactively.
Get in touch with our security team
For security-related questions, concerns, or to report a vulnerability, please contact our security team:
For security vulnerabilities and incidents
Response Time
We aim to respond to security inquiries within 48 hours