π API Security Overview
ClosedLoop AI takes security seriously. This section covers API security practices, authentication methods, data protection measures, and rate limiting for secure integration.π Authentication & API Keys
API Key Security
- Store your API key securely and never expose it in client-side code
- Use environment variables or secure key management systems
- Rotate your API keys regularly for enhanced security
- API keys are tied to your team and inherit your teamβs permissions
Best Practices
- Never log or print API keys in your application logs
- Use different API keys for different environments (test vs production)
- Monitor your API usage for unusual patterns
- Report any security concerns to security@closedloop.sh
π‘οΈ Data Protection
Encryption in Transit
- All API communications use HTTPS/TLS 1.3 encryption
- Webhook endpoints support HMAC signature verification
- API keys are transmitted securely over encrypted connections
Data Isolation
- Customer data is isolated per team with strict access controls
- No cross-team data access or sharing
- Data is processed securely and never stored longer than necessary
Data Retention
- Raw customer data is processed and then securely deleted
- Only AI-generated insights are retained for your team
- You can request data deletion at any time
π¦ Rate Limits & Abuse Prevention
Rate Limiting
- Free Plan: 100 requests/hour
- Pro Plan: 1,000 requests/hour
- Enterprise: 10,000 requests/hour
Rate Limit Headers
All API responses include rate limit information in headers:Rate Limit Behavior
- Rate limits are applied per API key
- Exceeding limits returns HTTP 429 (Too Many Requests)
- Limits reset at the top of each hour
- Consider implementing exponential backoff for retries
π Webhook Security
HMAC Verification
All webhook endpoints support HMAC signature verification to ensure data integrity:Webhook Best Practices
- Always verify HMAC signatures
- Use HTTPS endpoints for webhook receivers
- Implement idempotency to handle duplicate webhooks
- Set appropriate timeouts for webhook processing
π¨ Incident Response
Security Monitoring
- Security monitoring and alerting
- Regular security assessments and updates
Incident Reporting
If you discover a security vulnerability or incident:- Email: security@closedloop.sh
- Include: Detailed description, steps to reproduce, potential impact
- Response: Weβll acknowledge within 24 hours and provide updates
π§ Security Configuration
Environment Variables
Docker Security
Network Security
- Use VPN or private networks for sensitive integrations
- Implement proper firewall rules
- Monitor network traffic for anomalies
π Security Support
Contact Information
- Security Issues: security@closedloop.sh
- General Support: support@closedloop.sh
- Emergency: Available 24/7 for critical security issues
Report a Security Issue
Contact our security team for vulnerabilities or incidents