Security built for Private AI
frenzy.bot runs on dedicated private infrastructure with data isolation, TLS-encrypted connections, encrypted secrets storage, and strict access controls so your knowledge never leaks.
Private Architecture, End to End
Your AI stack is isolated by design: dedicated infrastructure, encrypted secrets, hardened servers, and audited access across every layer.
Encryption & Transport
TLS-encrypted connections (1.2+) with auto-provisioned Let's Encrypt certificates and hardened nginx headers (HSTS, X-Frame-Options, CSP). Sensitive credentials encrypted at rest using Fernet symmetric encryption.
Isolated Data Planes
Each client runs in its own private RAG silo with strict access boundaries.
Auditable Trails
Every sync, query, and admin action is logged for compliance reviews.
Server Hardening
SSH port randomization, UFW firewall with deny-all default policy, kernel-level network tuning, Docker port isolation, and server token suppression on every deployment.
Why Teams Trust frenzy.bot
Built for regulated teams that need strong guarantees without slowing down.
You Own the Data
All documents, embeddings, and logs stay on your infrastructure and under your control.
Private RAG Silos
No shared indexes. Each organization gets its own sealed knowledge base.
Role-Based Access
Granular permission system with custom roles, per-module access controls, and team management for enterprise admins. Bcrypt password hashing with per-user salts.
AI Privacy
Queries are routed through OpenRouter to third-party LLMs. Your data is never used to train or fine-tune models. LLM providers process prompts transiently under their own zero-retention data handling policies.
Trust Roadmap
Enterprise-grade controls and certifications on a clear schedule.
SAML/SSO
Single sign-on and IdP integrations for centralized access.
SOC 2 Type II
Controls and audit program aligned with SOC 2 requirements.
Private Cloud Regions
Regional private deployments with data residency options.
Need a security review?
We provide architecture notes, threat model walkthroughs, and compliance documentation for your team.