Postgres RLS, on every query.
Tenant scoping runs at the database, not in API code. Every connection sets app.current_tenant; the policy filters every read and write.
Postgres RLS for tenant isolation. AES-256-GCM envelope encryption for provider credentials. Audit log on every persona, agent, tool, and conversation change. Per-subject DSAR and right-to-be-forgotten on every plan. Where we stand on SOC 2, HIPAA, and SSO. All on this page.
Architecture
Tenant scoping runs at the database, not in API code. Every connection sets app.current_tenant; the policy filters every read and write.
Per-credential DEK wrapped by a Cloud KMS-managed KEK. Plaintext lives in process memory only — cached at most 60 seconds across sessions, never on disk, never in logs.
Postgres on Cloud SQL with disk encryption at rest. TLS 1.3 on every public endpoint. Caches and compute live on a private VPC.
Persona, agent, tool, and conversation changes write to an audit log with actor, timestamp, and a before/after diff. Exportable on request.
OPERATOR MODEL
Provider keys (OpenAI, Anthropic, Cartesia, ElevenLabs…) are AES-256-GCM envelope-encrypted: a per-credential DEK wrapped by a Cloud KMS-managed KEK. Plaintext is held in process memory only — cached at most 60 seconds across sessions, never on disk, never in logs, never visible to Hyponema operators through normal channels. Conversations are tenant-isolated by Postgres row-level security: app.current_tenant is set on every connection and the policy filters every query at the database layer.
Provider keys
AES-256-GCM encrypted with a per-tenant data key. Never returned via API.
Anthropic
sk-ant-····qB9K · 2 days ago
OpenAI
sk-····7nTm · 5 days ago
Cartesia
cs-····Jp4w · 11 days ago
ElevenLabs
xi-····R0fa · 3 weeks ago
MCP SERVER
The MCP server exposes the relational memory engine — narrative arcs, emotional trajectory, session resume, supersede chains — to any MCP-aware client. Seven tools over stdio or HTTP/SSE. Namespaced bearer tokens (hypmcp_*) kept separate from the platform tokens. BYO LLM credentials so reflection and consolidation run on your bill, not ours. Five-minute integration; full graduation to the platform when you need persona drift, sleep windows, and outbound scheduling.
MCP server token
activehypmcp_·····························mZ8
stdio · HTTP/SSE · namespaced separately from platform tokens
Compliance
Plain status on every standard. Last updated April 2026.
Need SOC 2, HIPAA, or SSO before procurement signs off? Tell us what your buyer asks for and the timeline. We’ll share where we are and what we can commit to in writing.
Talk to usData export
Per-subject export bundles the user’s memories, conversations, narrative arcs, and audit trail as JSON. The forget cascade does the inverse: every memory, arc, thread, embedding, and transcript purged with an audit record of the deletion.
# Start a DSAR export for one user
curl -X POST https://api.hyponema.ai/workspaces/$WS_ID/subjects/$SUBJECT_ID/export \
-H "Authorization: Bearer $HYP_KEY"
# Returns { id, status: "pending", ... }
# Poll the export until status is "ready":
curl https://api.hyponema.ai/workspaces/$WS_ID/dsar-exports/$EXPORT_ID \
-H "Authorization: Bearer $HYP_KEY"
# When ready, the response includes s3_url (signed, time-limited).Bring your own keys. Join the waitlist for early access.