Security
LogStitch is infrastructure for audit logs. Security isn't a feature we bolt on — it's the foundation everything else is built on.
Infrastructure
- Hosted on Vercel with automatic TLS and edge caching.
- Database hosted on Supabase Cloud (AWS) with encryption at rest (AES-256) and in transit.
- All API traffic served over HTTPS. HTTP requests are upgraded automatically.
- Master API keys encrypted with AES-256-GCM before storage. Project keys are hashed with SHA-256.
Data Protection
- Events are append-only and immutable. No UPDATE or DELETE operations are supported on event data.
- Every event is content-hashed (SHA-256) at ingest time for tamper detection.
- Built-in PII redaction automatically detects and scrubs credit card numbers, SSNs, email addresses, phone numbers, and API keys before storage.
- Custom redaction rules let you define project-specific patterns.
- Tenant-scoped access controls ensure customers can only query their own events.
Authentication & Access
- API key authentication with constant-time comparison to prevent timing attacks.
- Viewer tokens are short-lived JWTs (1-hour default, 24-hour maximum) that enforce tenant-scoped read access.
- Dashboard authentication via Supabase Auth with magic link and Google OAuth support.
- All API responses include a unique
request_idfor audit trail and debugging.
Security Monitoring
- Built-in security alert detection for brute force attacks, privilege escalation, impossible travel, and mass deletion patterns.
- Webhook delivery for security alerts with HMAC signature verification.
- Custom detection rules with configurable thresholds and time windows.
Responsible Disclosure
If you believe you've found a security vulnerability in LogStitch, we want to hear about it. Please report it to security@logstitch.io. We ask that you give us reasonable time to address the issue before public disclosure.
Our security.txt file is available at the standard well-known URI.