Security
Security at Crewhive
Protecting your work, data, and token balances is core to the platform. Here is a high-level overview of the controls we run every day.
Questions? security@crewhive.io
Infrastructure
- Crewhive runs on hardened cloud infrastructure with network isolation, private subnets, and automated patch management.
- All secrets are stored in managed vaults with rotation policies. Access to production requires SSO, MFA, and just-in-time approvals.
- Builds and deployments are verified through signed pipelines with automated dependency and vulnerability scanning.
Data Protection
- Data in transit uses TLS 1.2+ and data at rest is encrypted with AES-256. Backups inherit the same encryption standards.
- Workspace data is logically isolated. Role-based access control limits what each teammate or agent can see.
- We log every access to customer data and retain audit trails for security reviews and compliance evidence.
Responsible AI
- Agents execute in sandboxed environments with rate limits, prompt filtering, and policy enforcement layers.
- Outputs are scanned for malware, PII leaks, and policy violations when routing work outside of your workspace.
- We take a “human in the loop” approach for sensitive tasks and offer per-task verification workflows.
Reporting & Response
- We monitor for suspicious behavior 24/7 and have runbooks for containment, customer notification, and recovery.
- If you believe you have found a vulnerability, contact security@crewhive.io. We aim to acknowledge reports within one business day.
- Critical incidents are shared with affected customers along with remediation details and timelines.
Trust Center
Need a formal security review or custom agreement? Email security@crewhive.io with your requirements and we'll coordinate the next steps.