Security

Security

Security and trust are foundational to Carryr. Our platform is designed to protect sensitive digital asset information, ensure instructions are followed correctly, and leave a clear, reviewable record of every critical action.

Carryr combines Cloudflare’s edge security with Firebase’s managed identity and data protections to deliver a security posture that is modern, resilient, and continuously monitored.

Our security approach

Carryr is built around three principles:

  • Protect sensitive data at all times
  • Limit access strictly by role and intent
  • Ensure every critical action is verifiable and auditable

We design our systems so that no single step, user, or system can silently bypass safeguards.

Core security controls

Encryption by default

All data is encrypted:

  • In transit using TLS
  • At rest using industry-standard encryption provided by Firebase and Cloudflare-backed infrastructure

Sensitive credentials and access details are never exposed unnecessarily and are handled only within controlled execution workflows.

Identity, authentication, and sessions

Authentication is handled through Firebase Authentication, supporting:

  • email-based authentication
  • optional multi-factor authentication (MFA)
  • secure, short-lived session tokens

Sessions are protected using standard best practices, including token validation and expiry.

Role-based access control

Access is strictly limited based on role:

  • Owner — sets assets and instructions
  • Executor / Trusted contact — optional oversight or approvals
  • Beneficiary — receives assets or proceeds, without unnecessary access

Users can only see or act on what they are explicitly permitted to access.

Edge protection and abuse prevention

Carryr is fronted by Cloudflare, providing:

  • DDoS protection
  • Web Application Firewall (WAF)
  • rate limiting and bot mitigation
  • protection against common web attacks

This ensures the platform remains available and resistant to automated abuse.

Execution integrity

Verified triggers

No execution begins without:

  • confirmation that defined trigger conditions are met
  • identity verification checks
  • system validation of required approvals (where configured)

This prevents premature or unauthorised actions.

Controlled execution workflows

Execution steps are:

  • gated
  • deliberate
  • limited to the minimum access required

Sensitive operations are never performed directly from the client and are handled through secured server-side workflows.

Audit logging and traceability

All sensitive actions are recorded, including:

  • instruction changes
  • approvals and reviews
  • execution steps and outcomes

Logs are immutable and time-stamped, providing a clear chain of events.

Reporting and records

Carryr provides:

  • clear execution summaries
  • downloadable reports (PDF / CSV)
  • audit-ready records suitable for personal, legal, or administrative use

These records help reduce uncertainty and provide transparency to all relevant parties.

Compliance and certifications

Carryr does not claim compliance certifications unless they have been formally achieved.

If and when certifications such as SOC 2 or ISO 27001 are obtained, this page will be updated with:

  • certification scope
  • issuing body
  • effective dates

Responsible disclosure & security contact

We welcome responsible disclosure of security concerns.

For security-related inquiries or to report a vulnerability, please contact us via the Contact page or at a dedicated security email once published.