ForgeHouse Security

Security overview for customers, partners, and vendor risk/security reviews.

FieldValue
DocumentForgeHouse Security Overview
Version1.1
Last updatedApril 9, 2026
AudienceCustomers, partners, and security reviewers evaluating ForgeHouse
Contact (security)leon@forgehouse.io (subject: “Security”)
Related docsPrivacy Policy

This document describes how ForgeHouse approaches security and data protection for the ForgeHouse platform (web application, mentor agents, expert onboarding, and related APIs). It is intended to be useful for vendor security reviews and common security questionnaires.

This overview does not replace our Privacy Policy or your agreement with us. Where this document and our Privacy Policy overlap, the Privacy Policy is the authoritative description of privacy practices and disclosures.


At a glance


Table of contents

  1. Purpose, scope, and shared responsibility
  2. Definitions and system components
  3. Architecture and trust boundaries
  4. Data categories and lifecycle (collection → processing → storage → deletion)
  5. Identity and access management
  6. Application security and secure development practices
  7. Data protection (in transit, at rest, secrets)
  8. AI security considerations
  9. Logging, monitoring, and auditability
  10. Vulnerability management and responsible disclosure
  11. Incident response and business continuity
  12. Third-party processing and subprocessors (by category)
  13. Compliance posture and available artifacts
  14. Security roadmap (clearly labeled)
  15. Changes and contact

1. Purpose, scope, and shared responsibility

1.1 Purpose

ForgeHouse provides an AI-enabled mentoring experience. Security is designed to protect:

1.2 Scope

In scope (non-exhaustive):

Out of scope:

1.3 Shared responsibility


2. Definitions and system components

This document uses the following terms:


3. Architecture and trust boundaries

The diagram below is illustrative. It is intended to show trust boundaries and major data flows without naming vendors.

High-level data flow
User clientForgeHouse appManaged databasePayment processorAI providersTLS
  • Traffic between user devices and the application is protected using TLS (HTTPS).
  • The application connects to managed services (database, payments, AI) over encrypted channels.

Trust boundary intent:


4. Data categories and lifecycle

This section describes what data we handle and how it flows through the system. The Privacy Policy is the authoritative source for retention details and disclosures.

4.1 Data categories (summary)

DataCategoryExamplesPrimaryUseSharedWithSubprocessors
AccountAndProfileEmail, name, avatar (depends on sign-in method)Authentication, account managementHosting and database categories; auth category where used
ConversationsAndInsightsMessages, outputs, saved insightsProvide mentor experience and user featuresAI category as needed; hosting and database categories
MentorKnowledgeExpert onboarding content, derived representationsPower a specific mentor experienceAI category as needed; vector index category if used
EmbeddingsNumerical vectors derived from contentRetrieval and rankingVector index category if used
BillingMetadataSubscription status and billing metadataSubscription enforcement and billing supportPayment processor category
OperationalTelemetryErrors, abuse signals, security eventsReliability and security monitoringMonitoring/logging category

4.2 Data lifecycle: collection → processing → storage → deletion

ForgeHouse aims to minimize data collection to what is required to operate the service and deliver the product.

4.3 What ForgeHouse does not store


5. Identity and access management

5.1 End-user authentication

5.2 Authorization and tenancy

5.3 Administrative access (internal)

ForgeHouse intends to apply least-privilege to internal access to production systems and customer data. Where deeper information is required for enterprise diligence, additional details and evidence may be shared under NDA.


6. Application security and secure development practices

ForgeHouse aims to reduce common application-layer risks by applying practices such as:

This overview does not enumerate a full SDLC control catalog. Where required for enterprise diligence, we may provide additional detail under NDA.


7. Data protection (in transit, at rest, secrets)

7.1 Data in transit

7.2 Data at rest

7.3 Secrets


8. AI security considerations

AI-enabled systems introduce additional risks beyond traditional SaaS controls. This section summarizes design intent and common mitigations ForgeHouse aims to apply.

8.1 Data minimization for model calls

When invoking AI providers, ForgeHouse intends to:

8.2 Mentor knowledge isolation and cross-tenant risk

ForgeHouse’s mentor knowledge is intended to be logically scoped to the relevant mentor experience. In practical terms, this means:

8.3 Prompt injection and tool misuse

ForgeHouse expects and designs for the possibility that users may attempt to coerce the system into unintended behavior (for example requesting secrets, or attempting to access data they do not own). Where the product offers tool-like operations, ForgeHouse aims to reduce risk through techniques such as:

8.4 Provider training and retention

Our Privacy Policy states that we do not use customer conversations to train AI models. Provider-side retention of API payloads is governed by provider policies and applicable commercial terms.


9. Logging, monitoring, and auditability

ForgeHouse maintains operational telemetry appropriate to running a web application, for example:

This overview does not publish log schemas or precise retention periods. Where required for enterprise reviews, details may be provided under NDA.


10. Vulnerability management and responsible disclosure


11. Incident response and business continuity

11.1 Incident response lifecycle

ForgeHouse’s incident response process generally follows:

  1. Detect and validate
  2. Triage and scope
  3. Contain
  4. Eradicate and remediate
  5. Recover and verify
  6. Document and improve (post-incident review)

11.2 Notification

Where we determine that applicable law or contract requires customer notification, we will follow those obligations. This document does not create notification duties beyond your agreement and applicable law.


12. Third-party processing and subprocessors (by category)

ForgeHouse uses subprocessors for common SaaS functions. The authoritative list is maintained alongside the Privacy Policy, and is updated when subprocessors are added or materially changed.

Typical categories include:

Data shared with subprocessors is intended to be limited to what is required for each function (for example account identifiers, content required for AI calls, payment metadata, operational telemetry).


13. Compliance posture and available artifacts

13.1 Compliance posture

ForgeHouse designs and operates the service with practices common to modern B2B SaaS (access control, encryption in transit, vendor diligence). ForgeHouse does not claim certifications (for example SOC 2 Type II) in this document unless and until we publish them separately.

13.2 Available artifacts (may be shared under NDA)

Depending on the engagement, ForgeHouse may be able to provide documents such as:


14. Security roadmap (clearly labeled)

This section describes goals and intended improvements. Roadmap items are not commitments and may change.

Potential roadmap themes include:


15. Changes and contact

15.1 Changes

We may update this overview to reflect product or legal changes. The Last updated date at the top will change when we do. Material reductions in protection will be communicated as required by law or contract.

15.2 Contact