Security
Last updated: May 3, 2026
Service security model
Wexford Intelligence uses a least-privilege model for source access, credential handling, and delivery endpoints. Access to client delivery spaces is restricted to named users and operationally needed maintainers.
Data handling
Client outputs are delivered per tenant with separation of datasets, run history, and file access paths. Credentials and API keys are stored in environment-managed secrets and are never embedded in public pages.
Operational controls
- Source health checks and run-level validation before publish.
- Schema checks and exception outputs for review.
- Access revocation and account rotation for offboarding.
- Audit-friendly run identifiers on published outputs.
Responsible disclosure
Security questions or reports may be sent to [email protected]. Please include reproduction steps and impacted endpoint details.