Receptionist is built with production-minded security controls for tenant data, credentials, and workspace configuration.
Connector secrets and sensitive configuration values are encrypted before storage.
Data exchanged between browsers, our application, and providers is protected with modern encryption.
Every workspace operates in complete isolation. Data and secrets are never shared across boundaries.
Managed authentication through WorkOS. Workspace memberships and role checks remain application-owned.
Every significant action — connector setup, secret rotation, config change — is logged.
Role-based access control ensures only authorized members can modify sensitive configuration.
Practices
If you discover a security vulnerability, please report it responsibly to security@receptionist.dev