Security & Privacy
Read-only access,
clearly explained
What we can read, what we cannot touch, and how to revoke access in one click.
Control-Led
Architecture
AES-128
Encryption
TLS 1.2+
In Transit
Read-Only
Access
Cloud Run
Isolation
Supabase RLS
Data Boundaries
Responsible Disclosure
If you discover a security vulnerability, please report it responsibly to support@ga4audits.com. We take every report seriously and will respond within 24 hours.