TRUST
Last updated: April 16, 2026
Helm is built to run the operations of professional services businesses: sensitive client data, contracts, invoices, and the AI agents that act on them. Security is not a feature we add on; it is a design constraint. This page summarizes the practices and controls we follow.
Helm runs on Supabase, which hosts its data plane on AWS in SOC 2 Type II-audited regions. Our application tier is deployed on Vercel. Production infrastructure is configured as code and managed through version-controlled deployment pipelines.
Helm is multi-tenant. Every row in the database carries a workspace ID and is protected by Postgres row-level security policies. A query from one workspace cannot read or modify data in another workspace, even if the application layer is compromised. Agent memory, documents, tasks, and integration credentials are all workspace-scoped.
Helm's AI agents use third-party language model providers (primarily Anthropic) as sub-processors. Customer Content is sent only as needed to fulfill a request and is not used to train foundation models. Each agent has a configurable autonomy level (observe, suggest, or auto-execute) so you decide how much an agent can do without human review. High-risk operations (payments, destructive writes, external communication) are logged and auditable.
Application and database logs are retained and reviewed. We monitor error rates, latency, and anomalous access patterns. If we discover a security incident that affects your data, we will notify affected workspaces without undue delay and provide details about scope, cause, and remediation.
Databases are backed up on a continuous basis with point-in-time recovery. Backup data is encrypted and access is restricted to on-call engineers. We target high availability but recommend exporting critical records periodically using the built-in Import / Export tools.
Helm's hosting providers are SOC 2 Type II audited. We support privacy requests (access, deletion, portability) under GDPR, UK GDPR, and CCPA/CPRA. A Data Processing Agreement is available on request for customers subject to those regimes. Contact privacy@gethelm.ai.
If you believe you've found a security vulnerability in Helm, please report it to security@gethelm.ai. Include steps to reproduce and any relevant artifacts. We investigate every report in good faith, will not pursue legal action against researchers acting within this policy, and credit researchers in our changelog where desired.
Out of scope:
Security questions? Email security@gethelm.ai. For privacy matters see our Privacy Policy; for commercial terms see our Terms of Service.