How it works Capabilities Integrations Pricing
Sign in Get early access
Security

Security is built in,
not bolted on.

Brooke handles your business data — emails, documents, CRM records. We take that responsibility seriously. Here's exactly how we protect it.

End-to-end encryption
Approval-gated actions
Zero data training
Full audit logs

Cloudflare-native
infrastructure

Brooke runs entirely on Cloudflare's platform — Workers, D1, and R2. This is not a traditional cloud deployment. Every component runs at the edge, globally distributed, with enterprise-grade security at every layer.

TLS 1.3 everywhere All traffic to Brooke is encrypted in transit using TLS 1.3. No unencrypted connections are ever accepted.
Encrypted at rest All artifacts, run logs, and workspace data are encrypted at rest in Cloudflare R2 and D1 using AES-256.
V8 isolate per request Workers run in isolated V8 isolates — no shared memory, no shared file system between workspaces or requests.
DDoS protection & WAF Cloudflare's global network provides enterprise DDoS mitigation and a Web Application Firewall by default — no configuration required.
Cloudflare Stack
Cloudflare Workers Compute — edge runtime, V8 isolates
Compute
Cloudflare D1 Database — SQLite, encrypted at rest
Database
Cloudflare R2 Object storage — artifacts, docs, files
Storage
Cloudflare WAF + DDoS Network-layer protection, always on
Security
All data remains on Cloudflare infrastructure

Your data, your rules

Your data stays yours

We never train AI models on your data. Your runs, artifacts, and integration content are never used to improve our AI models or anyone else's. Full stop.

Strict data isolation

Every workspace is fully isolated at the database and storage layer. Your data is scoped to your workspace and cannot leak across customers — by architecture, not just policy.

Retention control

Artifacts stored for 90 days by default. Run logs retained for 12 months. You can delete your workspace data at any time — deletion is immediate and permanent.

Least privilege, everywhere

Workspace-scoped secrets

OAuth tokens and API keys are encrypted at rest and scoped to your workspace only. No cross-workspace key sharing.

Least-privilege connectors

Brooke requests only the minimum OAuth permissions needed for each integration. We never request broad access when narrow scopes suffice.

Role-based access

Admin, member, and viewer roles with granular permission controls. Admins control who can connect integrations, approve actions, and access billing.

Revoke anytime

Disconnect any integration, revoke any API key, or delete your entire workspace at any time from settings. Deletions are immediate and irreversible.

Safe AI by design

Brooke processes business content through AI. We enforce strict safeguards at every step — from what the model sees, to what it's allowed to do, to what it's allowed to say.

01

Prompt injection protection

User data, retrieved content, and connector payloads are treated as untrusted. Strict boundary separation prevents override of system instructions — even if injected into documents or emails.

02

Context scoping

The model only sees data relevant to the current run. No cross-workspace context, no cross-user history. Each run starts with a clean, scoped context window.

03

Tool call validation

All AI-proposed tool calls are validated against schema and policy before execution. Malformed, out-of-scope, or policy-violating tool calls are rejected before they can execute.

04

Exfiltration checks

Before any outbound action, content is checked for patterns consistent with attempted data exfiltration. Suspicious outputs are flagged and blocked before delivery.

Approval gates prevent mistakes

Every external action — sending email, updating CRM, publishing content, creating calendar events — requires explicit human approval before execution. This isn't a feature. It's a constraint.

Step 1
Brooke Plans
Gate
Approval Required
Step 3
You Review
Step 4
You Approve
Step 5
Execute

You are always in control. Brooke never takes irreversible actions without your explicit consent. Approval requests include a full preview of the intended action — exactly what will be sent, modified, or created.

Certifications & compliance

In progress

SOC 2 Type II

Formal audit in progress. Target completion: Q3 2026. Results will be shared with enterprise customers upon request.

Compliant

GDPR

Data processing agreements available for EU/EEA customers. Standard Contractual Clauses in place for international transfers.

Compliant

CCPA

California Consumer Privacy Act compliant. We do not sell personal data. California residents can exercise rights at privacy@brooke.com.

Available

Enterprise DPA / BAA

Custom Data Processing Agreements and Business Associate Agreements available for healthcare, finance, and enterprise customers.

Responsible disclosure

We take security vulnerabilities seriously and appreciate responsible disclosure. If you've found a potential security issue in Brooke, we want to hear from you.

Response time:All reports acknowledged within 24 hours
Bug bounty:Program coming Q2 2026

Disclosure guidelines

Give us reasonable time to fix before public disclosure
Do not access, modify, or delete other users' data
Include reproduction steps and impact assessment
We will credit researchers who help us improve security

Questions about security?

Our security team is happy to answer questions, provide documentation, or walk through our architecture in detail.