1. Security Architecture

Since FlowCoach stores no customer data, the blast radius of any security incident is limited to the current session only. There is no historical data to breach, no database to exfiltrate, no persistent credentials to rotate.

2. Supply Chain Security

3. Incident Response

If a security vulnerability is discovered in FlowCoach:

  1. Acknowledge the report within 24 hours
  2. Investigate and assess severity within 48 hours
  3. Deploy a fix for critical vulnerabilities within 72 hours
  4. Notify affected customers via email if data exposure is possible

Since FlowCoach stores no customer data, most incident scenarios have no data exposure component. The primary risk vector is session-level — and sessions are ephemeral by design.

4. Anthropic Sub-Processor

Anthropic's security practices: anthropic.com/security

5. Reporting a Vulnerability

We welcome responsible disclosure. If you discover a security vulnerability in FlowCoach:

For the complete data flow, see our Data Flow Diagram. For data handling details, see our Privacy Policy.