Security

Built for trust, not theater.

HELM holds sensitive financial data — account balances, holdings, transactions, beneficiaries, documents. We engineer for that responsibility from day one. No marketing fluff below — just what's actually deployed.

Encrypted at rest

AES-256 encryption on the Postgres database. Document Vault uploads are encrypted before storage.

TLS 1.3 in transit

All traffic between your browser and our servers uses TLS 1.3 with HSTS enforced. No mixed-content fallbacks.

Per-tenant isolation

Every query scopes to your operator_id via a Supabase JWT. No row leakage between accounts is possible at the API layer.

MFA available

Two-factor authentication via TOTP on every account. We strongly recommend enabling it from Settings.

No data sales — ever

We do not sell, broker, or share your data with advertisers, data brokers, or aggregators. Sub-processor list below.

GLBA-aligned

Voluntary alignment with the Gramm-Leach-Bliley Act and NY DFS Part 500 — written program, security lead, vendor diligence, IR plan, annual review.

What HELM never stores — and never will

Most wealth tools fail at the data-collection layer. They request brokerage logins through aggregators, pull every transaction in plaintext, retain everything indefinitely. HELM's architecture is the opposite — manual-first means the entire class of aggregator breaches is impossible by design, not by policy.

ItemWhy HELM doesn't have it
Brokerage / bank login credentialsHELM has no Plaid, Yodlee, MX, or Finicity integration — and never will. There is no place in our codebase to put a banking password.
Full account numbersWe ask only for last-4 (optional) when tagging a beneficiary or insurance policy for identification. Full numbers are never collected.
Bank routing numbers / wire instructionsNo field for them. No webhook accepts them. No function reads them.
Social Security numberNever collected. There is no SSN field in any form, schema, or API endpoint.
Government IDs (driver's license, passport)Never collected. We don't run KYC.
Credit card numbersStripe is the controller of card data. We receive only a customer ID and last-4. We never see the full PAN.
Plaintext passwordsBcrypt-hashed by Supabase Auth before any HELM code touches them. Anthropic engineers cannot recover a password.
Browser fingerprints / device IDsNo fingerprinting library deployed. We log only standard server access (IP, user-agent, route, timestamp) for 30 days for security/abuse detection.
Reverse-enrichment cookie dataNo Clearbit Reveal, RB2B, or visitor-deanonymization service is loaded — anywhere. Standing rule across the entire studio.
Tracking pixels for ad networksNo Meta Pixel, no Google Tag Manager, no LinkedIn Insight, no TikTok Pixel. Privacy is a product feature.

If we ever change any of these (we don't plan to), we will email every operator at least 14 days before the change with a non-marketing, plain-English explanation. You can opt out by exporting your data and deleting your account at any time.

Sub-processors

The complete list of vendors that can touch your data. Same list as in our Privacy Policy, surfaced here for transparency.

VendorPurposeComplianceRegion
SupabaseAuthentication (email + OAuth), JWT signingSOC 2 Type IIUS
NeonPostgres database, encrypted at restSOC 2 Type II, HIPAA-eligibleUS
AnthropicClaude AI (Ask HELM, Tax Brain, weekly digests)SOC 2 Type II — no training, no retentionUS
StripePayments & subscription billingPCI-DSS Level 1, SOC 1 + SOC 2US
BrevoTransactional email (welcome, weekly digest, receipts)GDPR-aligned, ISO 27001EU
NetlifyHosting, edge CDN, serverless functionsSOC 2 Type IIUS
NamecheapDomain registrar (atthelm.com)US

Authentication & access

Application security

AI safety

What goes to Anthropic: when you use Ask HELM, we send your prompt and a JSON snapshot of your portfolio to Claude. The snapshot includes account names, holdings, transactions, vesting grants, properties, insurance — but never your government ID, your full address, your full SSN, or files in the Document Vault. Claude responses are returned in real time. Anthropic does not retain prompts or train on HELM data per our enterprise terms. Your prompt and the response are stored in our database for thread continuity (60 days unless pinned).

Incident response

If we detect a security incident affecting your data, our process is: contain, investigate, notify, remediate.

Vulnerability disclosure

If you've found a vulnerability, please report it privately. We commit to acknowledging within 48 hours and remediating critical issues within 7 days.

Annual review

We conduct an annual review of: sub-processor list, security policies, IR runbooks, dependency posture, access controls, and disaster recovery. The most recent review was completed in April 2026; the next is scheduled for April 2027.

Last updated May 4, 2026 · Vantage Digital LLC · Texas, United States