Stride
Security & trust

What ships today, what doesn't yet.

The architecture, controls, and disclosures we can defend right now — plus an honest list of what's still on the roadmap.

Stride is observability software, not a regulated service. We don't custody assets, move money, settle transactions, advise on positions, or perform AML / transaction-monitoring as a regulated activity. Your team uses Stride to see what your treasury is doing. The regulated work — and the regulated relationships — stay with you.
Live today
6 controls
  • Read-only architecture
    No keys, no signing, no custody — Stride cannot move funds
  • RBAC
    Admin / editor / viewer enforced server-side
  • Append-only audit log
    Every mutation captured · exportable for auditors
  • Singapore data residency
    Supabase ap-southeast-1
  • Encryption at rest + TLS in transit
    Postgres native + managed storage
  • Tenant isolation
    workspace_id filter on every query · RLS policies in place
Not yet
4 on roadmap
  • SOC 2 Type 1
    On v1.0 roadmap, not attested today
  • SSO (SAML / OIDC)
    On v1.0 roadmap, Enterprise tier
  • ISO 27001
    Not yet
  • Third-party penetration test
    Internal review only today

If your security team needs one of these before piloting, write to hello@vypeconsulting.com — we prioritise on real demand.

Read-only by design

Stride is a view-only treasury workspace. We never hold private keys. We never sign transactions. We never custody assets. The only thing moving on the network is data about your wallets — addresses are public, balances and transactions are public, and the snapshots we store are a derived index of that public state.

This is a deliberate architectural choice. Even if Stride were fully compromised, an attacker could not move customer funds, redirect deposits, or sign transactions on a customer's behalf. The blast radius of any Stride incident is limited to read-side disclosure: snapshot records, address lists, and email/audit metadata.

Access controls (RBAC)

Workspaces have three roles, enforced server-side via the workspace context on every API request:

Role enforcement happens at the API layer (not just the UI), so direct API calls cannot bypass it.

Audit trail

Every workspace mutation writes an append-only row to the audit log. Captured events include: wallet add/remove/reassign, member invite/role change/removal, blocked-token additions, alert preference changes, bulk wallet imports, workspace renames, PDF audit pack generation, ERP CSV exports, P&L recomputes and method changes, off-chain position changes, monthly report sends, and snapshot-failure alert dispatches.

The activity log is visible to all workspace members and is exportable for external auditor review. Rows include actor user ID + email snapshot at the time of the event, target object, and a structured metadata payload.

Data handling

Operational practices

Regulatory posture

Stride does not custody assets, does not move money, does not provide execution, and does not handle client funds. On that basis we believe the product does not currently fall within the scope of payment-services licensing in Singapore (MAS Payment Services Act). We do not provide AML services or transaction monitoring as a regulated activity — those are customer-side responsibilities.

These statements are our product-level framing, not legal advice. If you operate in a regulated context (PI / EMI / VASP), you should obtain independent counsel on whether using Stride affects your licence obligations. We are happy to share architecture documentation with your compliance and legal teams.

What our team can — and cannot — see

Stride's ops team has service-role database access for incident response and support. We deliberately constrain what our back-office surfaces to minimise exposure of customer-confidential information, even from staff who have legitimate database access.

What staff sees in the back-office:

What staff does NOT see in the back-office:

For genuine support cases requiring deeper inspection, the workflow is: customer-initiated screen-share OR explicit consent OR formal legal process. Direct database access via Supabase Studio is logged at the infra layer with a documented reason.

Stride is observability software for your finance team — not surveillance software, including for our own customers.

Contact for security review

For security questions, vulnerability disclosure, or a procurement-style questionnaire, write to hello@vypeconsulting.com. For pilot terms, see pricing.