Responsible disclosure
If you believe you’ve found a security vulnerability in Argus, please report it to hello@ekarche.com. We acknowledge reports within 2 business days and provide a substantive response within 7 business days.
Please don’t exploit the vulnerability beyond what’s necessary to demonstrate the issue, don’t access customer data that isn’t yours, and give us a reasonable window to remediate before public disclosure. We do not currently run a paid bug-bounty program, but we are happy to credit researchers publicly with their permission.
How we protect customer data
Encryption
- In transit: all traffic is encrypted with modern TLS. HSTS is enforced in production.
- At rest: customer incidents and operational data and extracted data are encrypted at rest. Sensitive secrets and credentials get an additional application-layer encryption key.
- Webhooks: outbound webhooks are signed so your endpoint can verify they came from us and weren’t altered in flight.
Workspace isolation
- Every request is scoped to the calling workspace. Cross-workspace access is prevented at the data layer.
- API keys are workspace-scoped — a key from one workspace cannot read another workspace’s data.
- Bring-your-own storage is available on Enterprise.
Authentication
- Multi-factor authentication is available on every account and can be required for sensitive actions.
- Single sign-on is available for Enterprise customers, with per-workspace identity-provider configuration.
- Sessions are revocable; users can review and revoke active sessions from their profile.
Privacy
- We do not train AI models on your incidents or operational data. Inference runs against approved providers under contractual zero-retention terms.
- Data export and account deletion are self-service. See our privacy policy for details.
Subprocessors
Argus uses subprocessors in the categories below. Customers are notified at least 30 days in advance of any new subprocessor that processes their operational data.
| Category | Purpose |
|---|
| Cloud infrastructure | Compute, managed database, and object storage that power the service. |
| AI inference | AI severity classification, embeddings, and similar-incident search. Enterprise customers can route inference to dedicated or self-hosted environments. |
| Email delivery | Transactional emails — sign-in, alerts, billing receipts. |
| Payment processing | Billing data only. Payment processors never receive customer incidents and operational data or extracted content. |
The current named subprocessor register is available under DPA — email hello@ekarche.com to request it. Customer-initiated integrations (e.g. QuickBooks, Xero) are not subprocessors of Argus in the GDPR sense — the customer is the data exporter; we are the data sender on the customer’s behalf.
Security & compliance posture
We design and operate against widely-accepted security frameworks and care deeply about getting this right. We are not yet third-party audited; formal attestation is on our roadmap. In the meantime, we’re happy to walk customers through our controls and complete security questionnaires under NDA.
- GDPR: data export and deletion are self-service. EU data residency is available on Enterprise plans.
- HIPAA: not currently in scope. Reach out if your use case requires a BAA — we evaluate case by case.
Contact
Security questions, vulnerability reports, or DPA requests: hello@ekarche.com.
Our public security disclosure file is at /.well-known/security.txt (RFC 9116).