Security
Last updated: February 7, 2026
Zephex is a security-sensitive service (API keys can unlock access to tooling and usage). This page explains the practical controls we use to protect accounts and data.
Encryption
- In transit: TLS/HTTPS for dashboard and API traffic.
- At rest: sensitive fields are encrypted where appropriate, and secrets are not stored in plaintext.
API key handling
- API keys are validated by secure hashing on the server side.
- We never store plaintext API keys in the database.
- You can revoke or rotate keys at any time.
Access controls
- Role-based access for administrative actions.
- Database row-level security to isolate customer data.
- Scoped authorization for sensitive endpoints.
Monitoring and abuse prevention
- Rate limiting per API key/tier to reduce abuse and prevent runaway usage.
- Security logging for authentication events and suspicious activity.
- Alerting for high-risk patterns (e.g., repeated failed logins).
Reporting vulnerabilities
If you believe you found a security issue, email security@zephex.dev. Please include steps to reproduce and any relevant logs. Do not publicly disclose until we’ve had a chance to investigate.