Trust & Safety
Security
How we protect your data and our commitment to security
Overview
Our Security Commitment
Security is at the core of Clawbyte AI. We implement industry best practices to protect our infrastructure, your data, and the integrity of our security analysis.
Infrastructure
Infrastructure Security
Encryption
All data transmitted using TLS 1.3 encryption (HTTPS)
Database encryption using AES-256
Encrypted connections to Solana RPC endpoints
Access Controls
Infrastructure
Application
Application Security
Code Security
API Security
10–50 requests/hour depending on tier
SQL injection, XSS, CSRF
Read-Only Analysis
Clawbyte AI performs read-only blockchain queries. We never request your private keys, seed phrases, or transaction signatures for scanning. Wallet connection is only required for optional Safety Badge minting.
Data
Data Privacy & Protection
What We Never Store
Data Minimization
Public blockchain data only
Public on-chain data
Retention
Retained for shareable links - deletable upon request
90 days
1 year
Operations
Monitoring & Incident Response
Real-Time Monitoring
Incident Response Plan
Automated alerts trigger investigation
Immediate action to limit impact
Determine scope and affected data
Fix vulnerabilities and restore services
Inform affected users within 72 hours if applicable
Document and improve processes
Vendors
Third-Party Security
Enterprise-grade security certifications
SOC 2 compliance and data protection agreements
Reputable Solana infrastructure providers
Dependabot + Snyk on all dependencies
On-Chain
Smart Contract Security
Audits available upon request
Compliance
Compliance & Certifications
Research
Responsible Disclosure Policy
We appreciate the security research community and welcome responsible disclosure. If you discover a security issue, please follow these steps:
How to Report
Contact us privately
Email security@clawbyteai.xyz - PGP key available on request
Provide details
Steps to reproduce, impact assessment, and any proof-of-concept
Allow time for remediation
Give us 90 days to address the issue before public disclosure
Act in good faith
Don't access user data, disrupt services, or publicly disclose before we've patched
What We Promise
Response within 48 hours
Regular status updates on remediation progress
Public acknowledgment (if desired) after fix is deployed
We won't pursue legal action for good-faith research
Bug Bounty Program
A formal bug bounty program is planned for 2026. Researchers who report critical vulnerabilities may be eligible for rewards. Stay tuned for details.
Scope
Out of Scope
This is intentional by design
We monitor and patch these proactively
Users
Security Best Practices
When Using Clawbyte AI
Not required for scanning
Phantom, Solflare - from verified sources only
General Wallet Security
Contact
