Trust & Security

Enterprise-Grade Security

Your data is protected by industry-leading security practices. We implement comprehensive technical and organizational measures to keep your strategic information safe.

Last updated: April 16, 2026

Your Data Never Trains AI Models

We are committed to protecting your proprietary information. Your workspace content is never used to train, fine-tune, or improve AI models.

  • Your data is used only to provide the Service to you
  • Our AI providers automatically delete inputs and outputs within 30 days and do not use your data for model training
  • Your competitive strategies and sensitive information remain confidential

What We Don't Do

We never use your data to train AI models
We never share data between customers
We never sell or monetize your data
We never send your data to AI providers for storage or training — provider-side deletion within 30 days
Employee access to workspace content requires explicit authorization and is fully audit-logged

Data Protection

We implement multiple layers of encryption and security controls to protect your data at every stage.

AES-256 Encryption at Rest

All data stored in our databases is encrypted using AES-256, the same encryption standard used by governments and financial institutions.

TLS 1.2+ Encryption in Transit

All data transmitted between your browser and our servers is encrypted using TLS 1.2 or higher, preventing interception.

Automated Daily Backups

Daily automated backups with 30-day retention and point-in-time recovery (PITR) enabled for disaster recovery.

Database-Level Tenant Isolation

Database-level and application-level controls ensure one team cannot access another team's data.

Code & Repository Isolation

When our agents work on your code, your repository is protected by multiple layers of isolation. No other customer can access your files, credentials, or execution environment.

Ephemeral, Single-Tenant Containers

Each agent execution runs in a dedicated, isolated cloud container with only your team's credentials. The container is destroyed when the task completes. No shared filesystem, memory, or networking between customers.

Per-Team GitHub Credentials

GitHub App installation tokens are generated on-demand with 1-hour expiry and are never stored in our database. Each token grants access only to repositories you have explicitly authorized.

Team-Scoped Code Intelligence

Code Intelligence builds a semantic map of your codebase without storing full source files. All indexed data is scoped to your team with unique database constraints preventing cross-team access.

Immutable API Key Binding

Your Momental API key is permanently bound to your team at creation. Even if a container were compromised, it cannot query another team's data. Database-level row security enforces this as a backstop.

What We Don't Store

No Source Code at Rest Repos are cloned into ephemeral containers and destroyed after each task
No GitHub Tokens at Rest App tokens regenerated on-demand with 1-hour TTL, never persisted
No Cross-Team Queries Impossible by architecture: every query filtered by authenticated team ID
No Shared Execution State Each container gets only one team's env vars, credentials, and repo access

Authentication & Access Control

Enterprise-grade identity management with flexible authentication options.

Enterprise SSO

Sign in with your Google or Microsoft work account. Seamless authentication for your entire team.

Multi-Factor Authentication

MFA is available through your identity provider (Google, Microsoft). Enable MFA in your identity provider to add an extra layer of protection.

Role-Based Access Control

Role-based access control with admin enforcement for team management and sensitive operations.

AI Governance

Enterprise controls for AI-powered features with strict data protection.

Zero Training Policy

Your data is never used to train AI models. Our AI providers automatically delete API inputs and outputs within 30 days of processing.

Model Selection & Vetting

All AI models are vetted for short data retention windows, DPA availability, and contractual guarantees against training on customer data. Models are accessed via API only — we never fine-tune on your data.

AI Output Validation

All AI outputs are validated to prevent prompt injection, data exfiltration, and unsafe content. Flagged responses are automatically redacted before reaching users.

Granular AI Controls

Per-team admin controls for which AI features are enabled. Chat, document processing, voice, and conflict detection can be independently toggled per team and plan tier.

Audit & Compliance

Comprehensive logging and compliance features for enterprise governance requirements.

Comprehensive Audit Logging

We log all sensitive operations including login, data access, configuration changes, and administrative actions with full context.

Immutable Audit Logs

Audit logs are stored with immutability guarantees, ensuring they cannot be tampered with.

Per-Tenant Log Export

Export your organization's audit logs for compliance reporting, SIEM integration, or forensic analysis.

GDPR Rights Support

Full support for Article 17 (Right to Erasure) and Article 20 (Data Portability) with automated data export and deletion endpoints.

Compliance Roadmap

Third-party penetration test Q2 2026
SOC 2 Type I H2 2026
SOC 2 Type II 2027
ISO 27001 2027

Infrastructure

Built on enterprise-grade cloud infrastructure with high availability.

Enterprise Cloud Infrastructure

Hosted on enterprise-grade cloud infrastructure in the United States with SOC 2 and ISO 27001 certified data centers.

Web Application Firewall

Enterprise WAF with managed rulesets, DDoS protection, TLS termination, browser integrity checks, and bot mitigation.

Distributed Rate Limiting

Cross-instance rate limiting prevents abuse and ensures fair usage across all customers.

99.5% Target Uptime

We target 99.5% monthly availability with 48-hour advance notice for scheduled maintenance.

Architecture Highlights

All traffic is encrypted with TLS 1.2+ and inspected by Cloudflare WAF before reaching our servers. All data is stored and processed in the United States.

Isolated Services Webapp, API, and async worker run as separate containerized services
US-Only Data Residency All compute, storage, and AI processing in us-central1
Private Networking Services communicate over private VPC connections, not the public internet
8 Vetted Sub-processors Minimal third-party footprint with 30-day change notification

For detailed architecture diagrams, request our Security Architecture Whitepaper.

Sub-processors

We use a minimal set of trusted third-party services. Customers are notified of changes at least 30 days in advance.

Google Cloud Platform Primary infrastructure (compute, storage, database)
US
Anthropic AI chat, conflict detection, document analysis (30-day auto-delete)
US
Google Vertex AI Text embeddings (processing only, no storage)
US
Google (Authentication) Identity management (email/password, Google/Microsoft OAuth)
US
Cloudflare CDN, WAF, DDoS protection, TLS termination
Global edge
Voice Provider WebRTC voice infrastructure (real-time processing)
US
Cache Provider Distributed rate limiting, session caching (no message content)
US
Stripe Payment processing (we never store card numbers)
US

Enterprise Support

Dedicated resources and personalized service for enterprise customers.

Dedicated Success Team

Named customer success manager and direct access to our security engineering team for enterprise accounts.

Tailored Onboarding

Custom implementation plan designed for your organization, including integration support and admin training.

Priority Support

Priority response for critical issues with direct Slack or email access to our team.

Security Reviews

Periodic security reviews and compliance assistance to keep your deployment secure.

Security FAQ

Do you use my data to train AI models?

No. Your workspace content is never used to train, fine-tune, or improve AI models. Our AI providers automatically delete API inputs and outputs within 30 days of processing and do not use your data for training.

Can other customers see my code or repository files?

No. Your code is never accessible to other customers. Our agents run in ephemeral, single-tenant containers that receive only your team's credentials and are destroyed after each task. Your source code is never persisted in our database. Code Intelligence indexes a semantic map of your codebase scoped exclusively to your team, not full source files. Database-level security policies and application-level team filtering enforce isolation at every layer.

Where is my data stored?

All data is stored in the United States. For EU customers, we provide Standard Contractual Clauses (SCCs) for compliant international data transfers.

How do you handle data breaches?

We have a documented incident response plan. In the event of a breach affecting your data, we will notify you within 72 hours as required by GDPR, and within applicable timeframes for other jurisdictions (e.g., California).

Can I export or delete my data?

Yes. You can export all your data at any time through our API or by contacting support. You can also request complete deletion of your account and all associated data, which will be processed within 30 days.

Do you offer a Data Processing Agreement (DPA)?

Yes. Our Data Processing Agreement incorporates EU Standard Contractual Clauses and is effective upon acceptance of the Terms of Service. No separate signature is required. Contact [email protected] to request a countersigned copy.

What certifications do you have?

We are currently GDPR compliant with full data export and deletion support. SOC 2 Type II and ISO 27001 certifications are planned. Our infrastructure providers (Google Cloud Platform, Cloudflare) are SOC 2 and ISO 27001 certified.

Do you perform penetration testing?

Third-party penetration testing is planned for 2026. We currently use automated security scanning including dependency vulnerability scanning and static analysis. We have a responsible disclosure program for security researchers.

Contact

Our security team is available to answer questions and provide additional documentation for enterprise security reviews.

Email: [email protected]

Enterprise Security Package:

  • Data Protection Impact Assessment (DPIA)
  • Transfer Impact Assessment (TIA / Schrems II)
  • Security Questionnaire (SIG Lite style)
  • Embedding Data Lifecycle Documentation
  • Data Processing Agreement (DPA)
  • Subprocessor List

Contact [email protected] to request these documents.

Security Researchers:

We welcome responsible disclosure. Report vulnerabilities to [email protected]. Safe harbor provided for good-faith research.