Guardian Baby · Security & Compliance
Every Kaimera customer runs on dedicated, isolated compute. The same isolation model used by banks — not the shared containers used by most SaaS.
Security Architecture
Guardian Baby doesn't sleep. Six layers of protection stand between your data and the outside world.
Each customer gets their own Fly.io Machine with its own kernel, memory, and network stack. Not Docker containers on shared infrastructure — hardware-level isolation with persistent encrypted volumes.
TLS 1.3 on every connection. API keys and credentials stored in a service-role-only encrypted secrets table. No plaintext secrets ever touch application logs or client-facing responses.
Supabase Auth with OAuth 2.0 and PKCE. Row-level security on every database table ensures users can only access their own organization's data. Service-role isolation for sensitive operations.
Multiple layers: HSTS and security headers on every response, Fly.io private networking between services, token-authenticated gateway protocol, and timing-safe secret comparison.
850+ app integrations via Composio with OAuth 2.0 and scoped permissions. Integration tokens never leave your dedicated pod. Callback URLs dynamically validated per origin.
Security headers (HSTS, X-Frame-Options, CSP, Referrer-Policy, Permissions-Policy) enforced on every response. HTTPS-only — no HTTP fallback. Parameterized queries prevent SQL injection.
Isolation Comparison
| Security Property | Shared Containers (most SaaS) | Kaimera (Dedicated Machines) |
|---|---|---|
| Kernel isolation | Shared kernel | Separate kernel per customer |
| Memory isolation | Namespace-level (software) | Hardware-enforced (hypervisor) |
| Network stack | Shared, partitioned | Dedicated per customer |
| Blast radius | All customers on host | Single customer only |
| Side-channel attacks | Possible (shared CPU cache) | Mitigated (separate machine) |
| Independent patching | Host-level only | Per-customer machine lifecycle |
In Practice
Compliance
Infrastructure and practices designed for SOC 2 from day one. Formal audit underway.
EU data protection compliance. Data processing agreements available on request.
Payment processing handled entirely by Stripe. We never store or process card data.
We provide security documentation, data processing agreements, and can complete vendor security assessments for your team.
Responsible Disclosure
We welcome security researchers. If you discover a vulnerability, please report it to
security@kaimeraos.ai.
We commit to acknowledging reports within 48 hours.
Guardian Baby watches the perimeter
Your data runs on your machine. Not ours. Not anyone else's.