Trust, security, and compliance.
Mavrick handles your team’s marketing data. This page documents how that data is protected, what we commit to publicly, and where the evidence lives.
| Framework | Status | Target / Issued |
|---|---|---|
| SOC 2 Type 1 | In progress | Q3 2026 |
| SOC 2 Type 2 | Planned | Q2 2027 |
| GDPR | Aligned | Operational |
| CCPA | Aligned | Operational |
| ISO 27001 | On roadmap | Post-Type 2 |
| HIPAA | On roadmap | Demand-gated |
Mavrick’s compliance program clock started on April 15, 2026, with continuous internal logging from day one. Type 1 fieldwork with an external auditor is scheduled to begin in mid-2026. A six-month Type 2 observation period is planned to begin immediately following Type 1 issuance, running through Q2 2027.
While the Type 1 certificate is in progress, Mavrick operates to the same trust services criteria the audit measures. The Privacy Charter contractually binds us to those controls. Customers and prospective customers can request the current evidence folder under MNDA.
These are the four hard rules in the Mavrick Privacy Charter. They are contractual commitments, not posture statements. Every change to this list is a published, dated diff.
Mavrick reads Slack history only when a user-triggered task is actively executing. No cron jobs scan customer channels. No batch ingestion. No “read everything on install.”
Mavrick stores message bodies only when it was a direct party — a user @mentioned Mavrick, DMed Mavrick, or Mavrick replied in the thread. Ambient channel content is never persisted.
Every action that touches customer accounts requires explicit approval. There is no “always approve” preference, by design.
OAuth tokens are held by our managed connector layer (SOC 2 Type 2 certified). Direct credentials are stored in Supabase Vault, AES-256 encrypted, with an isolated master key. The agent receives tool descriptions; never tokens.
What Mavrick collects.
- Slack messages where Mavrick is a direct party (per Privacy Charter Rule 2). Stored in Supabase, RLS-isolated by workspace. Retained for 90 days rolling, purged on workspace uninstall.
- OAuth credentials for connected services. Managed integrations use Pipedream Connect (SOC 2 Type 2 certified) for OAuth token storage and proxy. Direct credentials are stored in Supabase Vault using pgsodium with AES-256 encryption and an isolated master key.
- Tool call audit logs. Every external API call Mavrick makes is logged with timestamp, tool name, parameters (sanitized), and workspace ID. Retained 12 months, queryable by workspace admins.
- Agent telemetry. Per-turn metadata: model used, duration, token counts, credit cost, error states. Used for billing reconciliation and the self-improvement loop. Workspace-scoped.
- Workspace-level metadata. Slack team ID, workspace name, plan tier, integration provider list (not credentials), credit balance. Required for product operation.
What Mavrick does not collect.
- Ambient channel content (per Privacy Charter Rule 1).
- Direct messages between users that do not include Mavrick.
- Customer data for the purpose of training AI models. Mavrick does not train models on customer data, ever.
- Personal identifying information beyond what is required for Slack OAuth and billing.
Where data lives.
- Primary database: Supabase (Postgres) — US region.
- Object storage: Cloudflare R2 — global edge, encrypted at rest.
- Cache layer: Upstash Redis — workspace-scoped, ephemeral.
- Agent runtime: Modal — US compute regions.
- Subprocessors: see § Subprocessors below.
In transit and at rest.
- All data in transit is encrypted with TLS 1.3.
- All data at rest is encrypted with AES-256.
- Vault credentials use pgsodium with an isolated master key.
Customer data export and deletion.
- Workspace admins can request full data export at any time. Delivered within 14 days as a JSON archive.
- Workspace admins can trigger full data deletion via Slack slash command (/mavrick purge-workspace) or via written request. Deletion completes within 7 days of request, with written confirmation.
- Workspace uninstall triggers automatic data purge of message bodies; metadata is retained 30 days for billing reconciliation, then purged.
The following service providers process customer data on Mavrick’s behalf. Each is contractually bound to handle customer data per Mavrick’s Privacy Charter and applicable regulations.
| Subprocessor | Purpose | Region | Compliance |
|---|---|---|---|
| Anthropic | Foundation model inference | US | SOC 2 Type 2 |
| OpenAI | Foundation model inference | US | SOC 2 Type 2 |
| Supabase | Database, auth, file storage | US | SOC 2 Type 2 |
| Modal | Agent runtime compute | US | SOC 2 Type 2 |
| Cloudflare R2 | Object storage (skill files, generated artifacts) | Global edge | SOC 2 Type 2 |
| Upstash | Redis cache, idempotency layer | US | SOC 2 Type 2 |
| Pipedream | OAuth credential management, third-party integration proxy (3,200+ connectors) | US | SOC 2 Type 2 |
| Stripe | Payment processing | US | PCI DSS Level 1, SOC 1 Type 2 |
| Vercel | Frontend hosting, edge functions | Global edge | SOC 2 Type 2 |
| Sentry | Error monitoring | US | SOC 2 Type 2 |
| Slack | Customer-facing surface (where Mavrick operates) | US | SOC 2 Type 2 |
Mavrick maintains a current subprocessor list with notification of material changes. Customers under enterprise plans can request notification before subprocessor changes take effect. Customers may request the most recent vendor security questionnaires under MNDA.
Mavrick publishes the underlying architecture that handles customer data. The following artifacts are public:
The Mavrick system prompt — every word the agent reads before responding. Versioned. Diffs published when material changes occur.
Read the system prompt →The self-improving architecture — closed-loop design, eight subsystems, seven signal channels, five guardrails. Documented in full.
Read the architecture documentation →The public learning ledger — every approved learning Mavrick has deployed. Includes regression status, approval timestamp, source workspace count.
See the changelog →The decline log — every drafted learning that was rejected by the operator approval gate. With one-line decline reason.
See the decline log →
This level of architectural transparency is uncommon. We publish it because customers entrusting their marketing data to an AI employee deserve to know exactly what the agent reads, what it can do, what it has learned, and what it has been prevented from learning.
Mavrick maintains a documented Incident Response Plan (IRP) aligned with SOC 2 Trust Services Criteria CC7.3, CC7.4, and CC7.5.
Process summary:
- 1.Detection — Automated monitoring via Sentry; customer-reported incidents via admin@getmavrick.com.
- 2.Triage — Incident classified within 4 hours of detection (severity levels P0 through P3).
- 3.Containment — Isolation of affected systems within 24 hours for P0/P1; within 72 hours for P2/P3.
- 4.Notification — Customers affected by a P0 or P1 security incident are notified within 72 hours of confirmation, via primary workspace contact.
- 5.Resolution — Root cause analysis, remediation, and verification within 14 days of containment.
- 6.Post-mortem — Written post-mortem published within 30 days of resolution. Customer-affecting incidents receive a public post-mortem; internal-only incidents receive a private one.
- 7.Continuous improvement — Every incident generates lessons-learned items that feed the next quarterly compliance review.
The full IRP document is available under MNDA.
Mavrick’s compliance program runs continuously, not as a one-time audit prep effort. The following artifacts are produced on a fixed cadence and stored in the versioned Mavrick Compliance/ evidence folder, available under MNDA.
| Cadence | Artifact |
|---|---|
| Continuous | Sentry incident logs (auto-captured) |
| Continuous | Supabase access logs |
| Continuous | Tool gateway audit log |
| Continuous | Pattern approval audit log (operator decisions) |
| Monthly (1st) | Compliance review log: Sentry summary + access review + pattern audit + customer data deletion fulfillment review |
| Quarterly | Privacy Charter review + diff if material changes |
| Quarterly | Subprocessor list review + notification if material changes |
| Annually | Full IRP review and tabletop exercise |
The clock started on April 15, 2026. Every month since then has a compliance review log entry. Customers and auditors can request the folder under MNDA to verify operational continuity.
Security questions, vulnerability disclosures, and compliance inquiries: admin@getmavrick.com
Response SLA:
- Customer-affecting security issues: 4 business hours
- Vulnerability disclosure (responsible): 48 business hours
- General compliance inquiries: 5 business days
- Subprocessor questionnaire requests: 5 business days
- MNDA evidence requests: 5 business days
For vulnerability disclosure, please include:
- The affected component
- Reproduction steps
- Suggested severity classification
- Your name and contact (or pseudonym, if preferred)
We commit to public disclosure of confirmed vulnerabilities within 14 days of remediation.