Security

Current security posture, privacy controls, and known governance gaps.

Beacon is materially stronger than its initial hackathon baseline, but this page is intentionally direct about the difference between implemented controls and a finished compliance program.

Search docs, support, and public pages
search
Current Strengths

What Beacon already does

Per-account privacy

Authenticated briefs, memory, and logs are scoped by Clerk user ID in the web app so one signed-in account does not see another account's data.

Trial isolation

Public trial usage is separated by session cookie and IP-based allowance instead of a single global shared state.

Encrypted BYOK storage

User-supplied Groq and SerpAPI keys can be stored through an authenticated route and are encrypted before being written to Redis.

MCP bearer auth

External MCP clients can authenticate with a dedicated token instead of relying on browser cookies.

Privacy Controls

What supports a more credible privacy posture

Retention windows are defined

Current implementation defines 30-day TTLs for memory and brief records and a 90-day TTL for saved provider keys. That is better than indefinite retention, even though it is not yet a full retention-control suite.

User-visible data review

Authenticated users can review memory, briefs, logs, and stored-key status through product surfaces, which supports basic access and deletion workflows.

Key material is masked in UI

The key-management API never returns raw saved credentials to the browser after storage; the UI only receives masked status.

Current Limits

What is not yet a finished security or compliance platform

No formal audit package

Beacon still does not ship a formal security whitepaper, penetration test report, SOC package, or enterprise DPA workflow.

Non-web identity mapping

Slack or similar chat-bot channels still need stronger user identity binding if they should inherit the same privacy guarantees as the signed-in web app.

Log governance needs another pass

Operational logs are retained as a rolling capped list rather than a formal retention schedule with documented deletion, minimization, and legal-hold controls.

Governance process is still operator-led

Privacy requests, incident handling, and transfer assessments still depend on product/operator process rather than a fully built in-app governance workflow.

Environment

Sensitive configuration

Core secrets:
  GROQ_API_KEY
  SERPAPI_API_KEY
  UPSTASH_REDIS_REST_URL
  UPSTASH_REDIS_REST_TOKEN
  CLERK_SECRET_KEY

Optional auth tokens:
  BEACON_MCP_TOKEN
  BEACON_PASSWORD
  BEACON_SESSION_TOKEN