Security

Last updated: 2026-04-07

Stratum Flow is a business service for continuously monitoring public information about competitors, markets, and technology, then turning it into reports. This page summarizes the security practices, subprocessors, and data-handling assumptions we can currently disclose.

1. Security overview

  • The frontend is served on Firebase App Hosting.
  • The backend uses Firebase Functions and Firestore.
  • Authentication is handled by Firebase Authentication with Email and Google sign-in support.
  • Users can configure two-factor authentication with TOTP or SMS from account settings.
  • Payments are processed by Stripe. We do not directly store card numbers or similar payment credentials.

2. Data protection and operations

  • All communication is encrypted with TLS.
  • API keys are stored as hashes, and the secret is shown only once at creation.
  • Prompts, target URLs, and portions of collected public web information needed for report generation may be sent to external AI providers.
  • Webhook, email notification, and API key settings are managed per contracted tenant.
  • Data that is no longer needed for operations is deleted or anonymized, and retention is managed under thePrivacy Policy.

3. Retention policy

  • Account information: while subscribed and for 30 days after cancellation
  • Job settings, run history, and reports: retained while subscribed and deleted within 30 days after cancellation
  • Access logs: up to 90 days for security purposes
  • Payment records: retained for the period required by law

4. Main subprocessors

Firebase / Google Cloud

Application hosting, authentication, database, and backend runtime

Stripe

Payment processing, billing information, and subscriptions

OpenRouter

External AI inference for report generation

Serper / Scrappey

Public web information retrieval, search, and page collection support

Resend

Inquiry and notification email delivery

For details, see thePrivacy PolicyandDPA / Contract page.

5. Contact

Security questionnaires, vendor registration, DPA requests, and vulnerability reports are accepted through thecontact form. For urgent issues, include[Security]at the beginning of the subject.