Skip to main content
Mavrick
> TRUST

Trust, security, and compliance.

Mavrick handles your team’s marketing data. This page documents how that data is protected, what we commit to publicly, and where the evidence lives.

Last updated: May 2, 2026
Compliance program clock started: April 15, 2026
> COMPLIANCE POSTURE
SOC 2 Type 1
In progressQ3 2026
SOC 2 Type 2
PlannedQ2 2027
GDPR
AlignedOperational
CCPA
AlignedOperational
ISO 27001
On roadmapPost-Type 2
HIPAA
On roadmapDemand-gated

Mavrick’s compliance program clock started on April 15, 2026, with continuous internal logging from day one. Type 1 fieldwork with an external auditor is scheduled to begin in mid-2026. A six-month Type 2 observation period is planned to begin immediately following Type 1 issuance, running through Q2 2027.

While the Type 1 certificate is in progress, Mavrick operates to the same trust services criteria the audit measures. The Privacy Charter contractually binds us to those controls. Customers and prospective customers can request the current evidence folder under MNDA.

> PRIVACY COMMITMENTS

These are the four hard rules in the Mavrick Privacy Charter. They are contractual commitments, not posture statements. Every change to this list is a published, dated diff.

No background channel reads.

Mavrick reads Slack history only when a user-triggered task is actively executing. No cron jobs scan customer channels. No batch ingestion. No “read everything on install.”

Participated-only persistence.

Mavrick stores message bodies only when it was a direct party — a user @mentioned Mavrick, DMed Mavrick, or Mavrick replied in the thread. Ambient channel content is never persisted.

Approval gate is architectural, not optional.

Every action that touches customer accounts requires explicit approval. There is no “always approve” preference, by design.

Credentials never reach the model.

OAuth tokens are held by our managed connector layer (SOC 2 Type 2 certified). Direct credentials are stored in Supabase Vault, AES-256 encrypted, with an isolated master key. The agent receives tool descriptions; never tokens.

> DATA HANDLING

What Mavrick collects.

  • Slack messages where Mavrick is a direct party (per Privacy Charter Rule 2). Stored in Supabase, RLS-isolated by workspace. Retained for 90 days rolling, purged on workspace uninstall.
  • OAuth credentials for connected services. Managed integrations use Pipedream Connect (SOC 2 Type 2 certified) for OAuth token storage and proxy. Direct credentials are stored in Supabase Vault using pgsodium with AES-256 encryption and an isolated master key.
  • Tool call audit logs. Every external API call Mavrick makes is logged with timestamp, tool name, parameters (sanitized), and workspace ID. Retained 12 months, queryable by workspace admins.
  • Agent telemetry. Per-turn metadata: model used, duration, token counts, credit cost, error states. Used for billing reconciliation and the self-improvement loop. Workspace-scoped.
  • Workspace-level metadata. Slack team ID, workspace name, plan tier, integration provider list (not credentials), credit balance. Required for product operation.

What Mavrick does not collect.

  • Ambient channel content (per Privacy Charter Rule 1).
  • Direct messages between users that do not include Mavrick.
  • Customer data for the purpose of training AI models. Mavrick does not train models on customer data, ever.
  • Personal identifying information beyond what is required for Slack OAuth and billing.

Where data lives.

  • Primary database: Supabase (Postgres) — US region.
  • Object storage: Cloudflare R2 — global edge, encrypted at rest.
  • Cache layer: Upstash Redis — workspace-scoped, ephemeral.
  • Agent runtime: Modal — US compute regions.
  • Subprocessors: see § Subprocessors below.

In transit and at rest.

  • All data in transit is encrypted with TLS 1.3.
  • All data at rest is encrypted with AES-256.
  • Vault credentials use pgsodium with an isolated master key.

Customer data export and deletion.

  • Workspace admins can request full data export at any time. Delivered within 14 days as a JSON archive.
  • Workspace admins can trigger full data deletion via Slack slash command (/mavrick purge-workspace) or via written request. Deletion completes within 7 days of request, with written confirmation.
  • Workspace uninstall triggers automatic data purge of message bodies; metadata is retained 30 days for billing reconciliation, then purged.
> SUBPROCESSORS

The following service providers process customer data on Mavrick’s behalf. Each is contractually bound to handle customer data per Mavrick’s Privacy Charter and applicable regulations.

Anthropic
PurposeFoundation model inference
RegionUS
ComplianceSOC 2 Type 2
OpenAI
PurposeFoundation model inference
RegionUS
ComplianceSOC 2 Type 2
Supabase
PurposeDatabase, auth, file storage
RegionUS
ComplianceSOC 2 Type 2
Modal
PurposeAgent runtime compute
RegionUS
ComplianceSOC 2 Type 2
Cloudflare R2
PurposeObject storage (skill files, generated artifacts)
RegionGlobal edge
ComplianceSOC 2 Type 2
Upstash
PurposeRedis cache, idempotency layer
RegionUS
ComplianceSOC 2 Type 2
Pipedream
PurposeOAuth credential management, third-party integration proxy (3,200+ connectors)
RegionUS
ComplianceSOC 2 Type 2
Stripe
PurposePayment processing
RegionUS
CompliancePCI DSS Level 1, SOC 1 Type 2
Vercel
PurposeFrontend hosting, edge functions
RegionGlobal edge
ComplianceSOC 2 Type 2
Sentry
PurposeError monitoring
RegionUS
ComplianceSOC 2 Type 2
Slack
PurposeCustomer-facing surface (where Mavrick operates)
RegionUS
ComplianceSOC 2 Type 2

Mavrick maintains a current subprocessor list with notification of material changes. Customers under enterprise plans can request notification before subprocessor changes take effect. Customers may request the most recent vendor security questionnaires under MNDA.

> ARCHITECTURE TRANSPARENCY

Mavrick publishes the underlying architecture that handles customer data. The following artifacts are public:

This level of architectural transparency is uncommon. We publish it because customers entrusting their marketing data to an AI employee deserve to know exactly what the agent reads, what it can do, what it has learned, and what it has been prevented from learning.

> INCIDENT RESPONSE

Mavrick maintains a documented Incident Response Plan (IRP) aligned with SOC 2 Trust Services Criteria CC7.3, CC7.4, and CC7.5.

Process summary:

  1. 1.
    Detection Automated monitoring via Sentry; customer-reported incidents via admin@getmavrick.com.
  2. 2.
    Triage Incident classified within 4 hours of detection (severity levels P0 through P3).
  3. 3.
    Containment Isolation of affected systems within 24 hours for P0/P1; within 72 hours for P2/P3.
  4. 4.
    Notification Customers affected by a P0 or P1 security incident are notified within 72 hours of confirmation, via primary workspace contact.
  5. 5.
    Resolution Root cause analysis, remediation, and verification within 14 days of containment.
  6. 6.
    Post-mortem Written post-mortem published within 30 days of resolution. Customer-affecting incidents receive a public post-mortem; internal-only incidents receive a private one.
  7. 7.
    Continuous improvement Every incident generates lessons-learned items that feed the next quarterly compliance review.

The full IRP document is available under MNDA.

> CONTINUOUS COMPLIANCE LOGGING

Mavrick’s compliance program runs continuously, not as a one-time audit prep effort. The following artifacts are produced on a fixed cadence and stored in the versioned Mavrick Compliance/ evidence folder, available under MNDA.

Continuous
Sentry incident logs (auto-captured)
Continuous
Supabase access logs
Continuous
Tool gateway audit log
Continuous
Pattern approval audit log (operator decisions)
Monthly (1st)
Compliance review log: Sentry summary + access review + pattern audit + customer data deletion fulfillment review
Quarterly
Privacy Charter review + diff if material changes
Quarterly
Subprocessor list review + notification if material changes
Annually
Full IRP review and tabletop exercise

The clock started on April 15, 2026. Every month since then has a compliance review log entry. Customers and auditors can request the folder under MNDA to verify operational continuity.

> SECURITY CONTACT

Security questions, vulnerability disclosures, and compliance inquiries: admin@getmavrick.com

Response SLA:

  • Customer-affecting security issues: 4 business hours
  • Vulnerability disclosure (responsible): 48 business hours
  • General compliance inquiries: 5 business days
  • Subprocessor questionnaire requests: 5 business days
  • MNDA evidence requests: 5 business days

For vulnerability disclosure, please include:

  • The affected component
  • Reproduction steps
  • Suggested severity classification
  • Your name and contact (or pseudonym, if preferred)

We commit to public disclosure of confirmed vulnerabilities within 14 days of remediation.