Security is fundamental to everything we build. We employ industry-standard practices and continuously monitor our systems to protect your data.
Cloud infrastructure hosted on AWS with DDoS protection, firewalls, and intrusion detection.
AES-256 encryption at rest and TLS 1.3 in transit. API keys encrypted at application level.
Two-factor authentication, role-based access controls, and session management.
Daily automated backups with point-in-time recovery and geographic redundancy.
24/7 automated monitoring with real-time alerting and incident response procedures.
Stripe-powered payments with PCI DSS Level 1 compliance. We never store card data.
Our infrastructure is hosted on Amazon Web Services (AWS) with Cloudflare CDN for DDoS protection. All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Daily automated backups with 30-day retention are replicated across multiple AWS availability zones. API keys and sensitive credentials are encrypted at the application level before storage.
We maintain compliance with GDPR for EU customers and CCPA for California residents. Payment processing is handled exclusively by Stripe (PCI DSS Level 1 certified)—we never store credit card numbers or CVV codes. Your monitoring data is never shared with third parties or used for purposes beyond providing our service. See our Privacy Policy for complete details.
We appreciate the security research community's efforts to responsibly disclose vulnerabilities and welcome reports from security researchers and users.
If you believe you've discovered a security vulnerability in our systems, please report it to us by emailing:
To help us understand and address the issue quickly, please include the following information:
When you report a security issue to us, we commit to:
To protect our users and systems, we ask that you:
This policy applies to:
The following are explicitly out of scope:
Generator Labs considers security research conducted in accordance with this policy to be:
We will not pursue legal action against researchers who follow these guidelines and report vulnerabilities responsibly.
We maintain a list of security researchers who have helped improve our security. If you'd like to be recognized for your contribution, please let us know in your report.
If you have any questions about our security practices or need more information, please contact our security team.
Last Updated: February 2026
PGP Key: Available upon request