Skip to main content
How we protect your data at every layer.

Container isolation

Every user gets a private container with multiple layers of isolation:
LayerWhat it protects
Process isolationYour container can’t see other containers.
Access controlMandatory profiles restrict system calls and file access.
System call filteringDangerous kernel interactions are blocked.
Unprivileged modeContainer root maps to a non-root user on the host.
Network isolationEach container gets a private IP. No direct access between containers.

Encryption

In transit

All connections use TLS encryption:
  • Browser to API (HTTPS)
  • API to Fleet Agent (HTTPS with shared secret)
  • Browser to container (WSS through reverse proxy)
  • Container to AI providers (HTTPS)

At rest

  • API keys — encrypted before database storage
  • Database — PostgreSQL with encryption at rest
  • Container filesystems — stored on encrypted volumes

Authentication

User authentication

EasyClaw uses managed authentication with:
  • Email/password with secure hashing
  • Session tokens with automatic refresh
  • Rate limiting on login attempts

Fleet Agent authentication

Communication between the public API and Fleet Agent uses a shared cluster secret, preventing unauthorized container operations.

AI provider keys

Your API keys are:
  1. Submitted once through the web console (TLS-encrypted in transit)
  2. Encrypted using a server-side key
  3. Stored in the database in encrypted form
  4. Decrypted only when injected into your container at spawn time
  5. Never logged, displayed, or transmitted in plaintext

Data handling

Data typeWhere it livesRetention
ConversationsYour container onlyDeleted when container is killed
AI memoryYour container filesystemDeleted when container is killed
Channel credentialsYour container filesystemDeleted when container is killed
API keysDatabase (encrypted)Until you delete them
Account dataDatabaseUntil you delete your account
Usage metricsDatabaseAggregated, non-identifiable
We don’t store your conversation content in our database. Conversations exist only inside your container. When your container is destroyed, conversations are permanently gone.

Infrastructure security

ComponentSecurity measures
FrontendDDoS protection, edge caching, automatic HTTPS
Public APIPrivate networking, automatic TLS, environment encryption
Fleet serversDedicated servers, firewall rules, SSH key auth only
DatabaseRow-level security, connection pooling, encrypted backups
DNSDDoS protection, WAF, proxied DNS records

What we don’t do

  • We don’t sell, share, or monetize your data
  • We don’t use your conversations to train AI models
  • We don’t log message content outside your container
  • We don’t track your browsing activity inside containers
  • We don’t access your container without your explicit request