Security Is Not
an Afterthought

Receptionist is built with production-minded security controls for tenant data, credentials, and workspace configuration.

Encryption at Rest

Connector secrets and sensitive configuration values are encrypted before storage.

Encryption in Transit

Data exchanged between browsers, our application, and providers is protected with modern encryption.

Tenant Isolation

Every workspace operates in complete isolation. Data and secrets are never shared across boundaries.

Secure Authentication

Managed authentication through WorkOS. Workspace memberships and role checks remain application-owned.

Audit Logging

Every significant action — connector setup, secret rotation, config change — is logged.

RBAC & Permissions

Role-based access control ensures only authorized members can modify sensitive configuration.

Practices

Our Security Practices

  • Dependencies are monitored and updated regularly.
  • Infrastructure relies on managed services, backups, and restricted operational access.
  • Secrets stay out of normal logs and API responses.
  • Least-privilege principles across service accounts and integrations.
  • Potential security issues are investigated promptly.

Report a Vulnerability

If you discover a security vulnerability, please report it responsibly to security@receptionist.dev