Security at ClawJolt
Data Handling
ClawJolt processes webhook payloads from external services (Stripe, GitHub, email providers) and routes them to your OpenClaw agents. Webhook payloads are held in memory during processing and not persisted after delivery. Trigger configurations and routing rules are stored encrypted per workspace.
Encryption
All data is encrypted in transit (TLS 1.3) and at rest (AES-256). API keys and credentials are stored using industry-standard secret management.
Infrastructure
Hosted on European infrastructure. Application containers are isolated per deployment. No shared tenancy between customers.
Access Control
Each trigger has its own unique webhook URL and signing secret for payload verification. Triggers are scoped per workspace and cannot access other workspaces' agents. Third-party service credentials (Stripe keys, GitHub tokens) are stored in isolated vaults per user.
Compliance Roadmap
- SOC 2 Type I — targeting Q3 2026
- GDPR — compliant by design (EU hosting, data minimization, right to deletion)
Responsible Disclosure
Found a vulnerability? Email security@clawjolt.com. We respond within 48 hours.
Questions
For security inquiries, contact security@clawjolt.com.