Security at Tracehound

We build security tools, so we take our own security seriously. Here is how we protect your data and ensure the integrity of our services.

Infrastructure Security

Our cloud infrastructure is hosted on industry-leading providers with rigorous security certifications (SOC 2, ISO 27001).

  • Encrypted data at rest and in transit
  • Strict access controls and least-privilege policies
  • Regular vulnerability scanning

Application Security

We employ rigorous code review processes and automated testing to prevent vulnerabilities in our software.

  • Static analysis and linting
  • Dependency scanning
  • Regular penetration testing

Responsible Disclosure

If you believe you have found a security vulnerability in Tracehound, please report it to us at security@tracehound.com. We appreciate your help in making our products safer.