[SECURITY · POSTURE]

Boring on purpose. Audited anyway.

We are a small team, but we do not take shortcuts on the things that hurt people when broken. Every conversation through muro is encrypted in transit and at rest, every admin action lands in an audit log, every employee with database access signed an NDA.

01

Encryption

TLS 1.3 in transit. AES-256 at rest. Backups encrypted with separate key. Per-workspace IV on file uploads.

02

EU-only data

Hetzner Falkenstein DE. No data ever leaves the EU. CDN edges only serve the static widget bundle.

03

Tenant isolation

Postgres row-level security on every table. Single SET LOCAL workspace_id at the start of each transaction. Tested on every CI run.

04

Audit log

90 days on Pro, unlimited on Self-hosted. Every admin action — invite, role change, settings edit, pattern fire — has a row.

05

GDPR built-in

DPA signed and downloadable. Sub-processor list public. Data export and right-to-erasure are buttons in your dashboard, not a support ticket.

06

Pen-tested

External audit by Cure53 every 12 months. Last report November 2025 — public summary on request.

[STANDARDS]

Compliance is not a sticker.

We list what we do, not what we plan to do. SOC 2 Type II is in audit (target Q4 2026); ISO 27001 follows. Until then, here is what we already have, signed.

GDPR · DPA on filelive
Sub-processor listlive
Pen-test (Cure53)live
TLS 1.3 enforcedlive
Row-level securitylive
SOC 2 Type IIin audit
ISO 27001planned
HIPAA BAAplanned

[RESPONSIBLE DISCLOSURE]

Found something? Tell us.

Email [email protected] with steps to reproduce. We acknowledge within 24h, fix critical issues within 7 days, and pay bounties up to €5,000 depending on severity. We do not threaten or sue researchers acting in good faith.

PGP fingerprint: 7F2A 91E4 … · scope: muro.chat + cdn.muro.chat