Fyneri / Trust / Security

Security as reduced surface area.

Card numbers never reach Fyneri's servers — they go straight to Stripe through Stripe Elements. That single architectural choice keeps us out of PCI-DSS Level 1 scope and dramatically reduces what an attacker could ever steal from us. The rest of this page is what we do for everything else.

Last updated · May 11, 2026 Disclose a vulnerability · security@fyneri.com
01 / Architecture

What we never touch.

Card numbers (PAN)

Stripe Elements only

Customers enter card details into iframes served directly by Stripe (js.stripe.com). The data goes to Stripe's PCI-DSS Level 1 environment without crossing our servers. We receive only Stripe's tokenized PaymentMethod reference.

CVV / CVC

Never stored, anywhere

Per PCI rules, no one stores CVV. We don't see it, Stripe doesn't store it. It's used once at authorization and discarded.

Bank account details

Stripe / Plaid only

ACH bank details are collected through Stripe Financial Connections (Plaid under the hood) and stored at Stripe.

Funds

Stripe holds the balance

Fyneri does not hold customer funds at any point. Stripe pays you directly to your bank account on your configured payout schedule.

02 / Encryption

In transit & at rest.

In transit

TLS 1.2 or higher · enforced

HTTPS-only across all subdomains. HSTS with includeSubDomains and preload. SSL Labs A+ target on all public endpoints.

At rest

AES-256 · AWS KMS

All databases and object storage encrypted at rest using AWS-managed keys (KMS). Backup snapshots inherit the same key policy.

Secrets

AWS Secrets Manager

API keys, signing secrets, and database credentials live in AWS Secrets Manager with automated rotation. No secret in source control. Pre-commit hooks scan for leaks.

Webhook signatures

HMAC-SHA256

Every outbound webhook is signed with a per-merchant secret. Replay protection via timestamp tolerance. Constant-time signature verification in all our SDKs.

03 / Access controls

Least privilege, always.

For employees

SSO + hardware MFA

Every Fyneri staff member authenticates via Google Workspace SSO with a hardware security key (FIDO2 / YubiKey). Production access is role-based, just-in-time, and audit-logged.

For merchants

TOTP & passkeys

Dashboard users can (and soon must, on Scale and Enterprise) enable TOTP-based MFA or WebAuthn passkeys. Recovery codes are generated and shown once.

API keys

Restricted, rotatable

Restricted API keys with resource-level permissions. Per-environment keys (test / live). Rotation is one click; revocation is immediate.

Audit logs

Every action, traceable

Every API call, every dashboard action, every employee touch on production data is logged with actor, IP, and timestamp. Logs immutable, retained 1 year minimum.

04 / Practices

How we build & respond.

SDLC

Code review & CI checks

Mandatory peer review on every PR. SAST and dependency-vulnerability scanning on every commit. Secret-leak prevention in pre-commit hooks. Production deploys are gated on a green build.

Testing

Penetration testing planned

Annual third-party penetration test scheduled to begin within 90 days of general availability. Findings are published in our security report to enterprise customers under NDA.

Monitoring

24/7 alerting

WAF, anomaly detection on API traffic, alerts on suspicious dashboard activity. PagerDuty rotation for high-severity events.

Incident response

Documented runbook

If a security incident affects merchant data, we notify affected customers without undue delay (within 72 hours where GDPR applies). Post-mortems are written for every Sev-1.

05 / Vulnerability disclosure

Found something?

We welcome and encourage responsible security research. If you've discovered a vulnerability in Fyneri, please report it to security@fyneri.com with as much detail as possible: affected endpoint, reproduction steps, impact, and your suggested fix if you have one.

What we ask:

  • Do not access, modify, or destroy data belonging to others.
  • Do not perform denial-of-service testing.
  • Use test mode accounts for proofs of concept.
  • Give us 90 days to remediate before public disclosure.

What we'll do:

  • Acknowledge your report within 2 business days.
  • Investigate, communicate progress, and credit you in a public hall of fame if you wish.
  • Once we exit pre-launch, pay bounties for qualifying findings under a documented scope.

Security contact

security@fyneri.com
PGP key available on request.

For non-security issues, please use contact.html.