Security & Compliance

  • HTTPS required: All production traffic must be encrypted. Follow TLS best practices.

  • Callback signatures: Use HMAC-SHA256 or public‑key signatures; include timestamp and replay protection.

  • Least privilege / minimal storage: Do not hold user private keys or sensitive credentials unless explicitly authorized.

  • Data compliance: Clearly state if you store PII; if you do, encrypt storage and enforce retention limits.

  • Idempotency: All write operations should include an idempotency_key.

  • Auditing: Log X-Request-Id, timestamps, and redacted results; align logs with Chronicle when applicable.

  • High‑risk capabilities: Any functions touching funds, live trading, or permission changes require multisig, allowlists, or human approval, and must provide audit documentation.

  • Identity & access (roadmap): Agent ID will be used to bind capabilities and permissions—please indicate this need on the form.

Last updated