Transport security
weaveleads is served over HTTPS, with HSTS enabled for production traffic.
Security
weaveleads handles lead data, embedded tools, and MCP API access, so security is part of the product surface. This page explains the controls we use today and the areas we are actively improving.
weaveleads is served over HTTPS, with HSTS enabled for production traffic.
Customer data lives in the production database and private object storage, not in public client code.
MCP API keys are stored as hashes, can be revoked, and are checked against suspended users.
The public embed runs inside an iframe, validates message origins, and ships with an SRI-ready snippet.
Passwords are hashed, verification codes are short-lived and hashed, API keys are stored as hashes, and production secrets are expected to live in Dokploy environment variables. PostgreSQL and Redis should stay internal to the VPS/project network, while public uploads are served from the configured R2 public URL.
The embed surface is intentionally split from the dashboard: dashboard pages deny framing, while public tool routes allow customer embedding and keep the interactive experience isolated in an iframe.
weaveleads is not SOC 2 certified today. The current focus is practical startup-grade security: strong headers, least-privilege access, secure key storage, rate limits, backups, and clear incident contact. A SOC 2 readiness process can be added as enterprise demand grows.