Levlr
  • Product
  • Vendors
  • Pricing
  • FAQ
Sign In Get Free Analysis →
Trust & Security

Security

Last updated: March 13, 2026

Contents

  1. Overview
  2. Data in transit
  3. Data at rest
  4. Document handling
  5. API key management
  6. Authentication
  7. Infrastructure
  8. SOC 2 compliance
  9. Sub-processors
  10. Incident response
  11. Penetration testing
  12. Disclosure policy
  13. Contact

Overview

Core commitment: Construction procurement documents contain commercially sensitive bid data, contract terms, and vendor pricing. We designed Levlr's architecture specifically so that documents are never written to persistent storage — not to a database, not to a file system, not to a log. They exist only in server memory for the duration of the analysis request.

This page describes the technical and organisational security measures we have in place across Levlr's infrastructure, application layer, and third-party integrations. We update it as our controls evolve.

Data In Transit

All communication between your browser and Levlr's servers is encrypted using TLS 1.3. Older TLS versions (1.0, 1.1) and weak cipher suites are disabled. HTTP requests are automatically redirected to HTTPS. Our TLS configuration targets an A+ rating on SSL Labs.

Communication between Levlr's serverless functions and third-party APIs (Gemini, Supabase) is also over TLS 1.3 on dedicated HTTPS connections. No document data is transmitted over unencrypted channels at any point.

Data At Rest

Account data, saved analysis sessions, vendor records, and project metadata are stored in Supabase (PostgreSQL), which encrypts all data at rest using AES-256. Database backups are also encrypted.

Supabase enforces Row Level Security (RLS) policies on every table. All queries are scoped to the authenticated user's ID — it is not possible for a query to return another user's data, even with a valid session token.

We do not store documents, bid files, contracts, invoices, or any uploaded content. These are processed entirely in server memory and never written to disk or database.

Document Handling

Documents are processed in memory only. The lifecycle of an uploaded document is: receive over TLS → load into RAM → extract text → send to Gemini API over TLS → discard. No file write operations occur at any point in this pipeline.

Specifically:

  • Documents are not written to Vercel's filesystem (ephemeral or otherwise)
  • Documents are not stored in Supabase Storage or any object storage service
  • Document contents are not written to application logs or error traces
  • Document contents are not cached at the CDN or edge layer

The only external service that receives document content is the Google Gemini API, which processes the text under Google's API data processing terms. Those terms prohibit Google from using API-submitted content to train models. See Google's policy at ai.google.dev/gemini-api/terms.

After the Gemini response is returned, the analysis result is either displayed in your browser session or saved to your account (if you choose to save it). The original document is never retained.

API Key Management

Levlr's Gemini API key is stored exclusively as a server-side environment variable in Vercel. It is never exposed to the browser, never included in client-side JavaScript, and never logged.

All AI analysis requests from the browser are routed through /api/gemini — a server-side proxy function that authenticates the request against Supabase, then forwards it to the Gemini API using the server-stored key. The raw API key is unreachable from the client under any circumstances.

Supabase credentials used server-side follow the same pattern: environment variables only, never bundled into client code.

Authentication

Authentication is handled by Supabase Auth, which uses industry-standard JWT (JSON Web Token) sessions. Passwords are hashed using bcrypt and never stored in plaintext. We do not have access to your raw password at any time.

Session tokens are short-lived and are validated server-side on every API request. Expired or invalid tokens are rejected with a 401 response — no document processing occurs without a valid authenticated session for paid features.

We plan to add support for SAML SSO and hardware security key (WebAuthn/FIDO2) authentication for Team and Enterprise accounts in a future release.

Infrastructure

Levlr is deployed on Vercel's edge infrastructure, with compute distributed across Vercel's global edge network. Static assets are served from Vercel's CDN. Serverless functions run in isolated V8 isolates with no persistent state between requests.

Our database runs on Supabase, hosted on AWS US-East-1. Supabase provides automated daily backups with point-in-time recovery, and maintains its own SOC 2 Type II certification.

Infrastructure dependencies:

  • Vercel — hosting, edge compute, CDN, serverless functions
  • Supabase (AWS US-East-1) — database, authentication, row-level security
  • Google Gemini API — AI analysis processing
  • Stripe — payment processing (PCI-DSS Level 1)
  • Resend — transactional email

SOC 2 Compliance

Levlr is currently undergoing a SOC 2 Type II audit covering the Trust Services Criteria for Security, Availability, and Confidentiality. We expect to complete the audit and publish the report in Q3 2026.

In the meantime, our current controls are designed to meet SOC 2 requirements:

  • Access control and least-privilege principles across all systems
  • Encryption at rest and in transit for all data
  • Automated monitoring and alerting for anomalous access patterns
  • Documented incident response procedures
  • Regular dependency audits and vulnerability scanning
  • Formal change management for all production deployments

Enterprise customers who require a current third-party attestation should contact us at security@levlr.io to discuss our interim security documentation.

Sub-processors

The following third-party services process data on Levlr's behalf:

  • Google LLC — AI analysis (document text, in transit only; not stored by Google per API terms). USA.
  • Supabase Inc. — database and authentication (account data, session history). AWS US-East-1, USA.
  • Vercel Inc. — hosting and compute infrastructure. USA / global edge.
  • Stripe Inc. — payment processing (billing data only). USA. PCI-DSS Level 1.
  • Resend Inc. — transactional email. USA.

We review sub-processors annually and will update this list when sub-processors change. Material changes are communicated to registered users by email with 30 days' notice.

Incident Response

We maintain a documented incident response plan covering detection, containment, eradication, recovery, and post-incident review. Key commitments:

  • Detection: automated monitoring for anomalous API usage, failed authentication spikes, and infrastructure alerts via Vercel and Supabase dashboards
  • Initial response: within 4 hours of detection for severity 1 incidents
  • User notification: within 72 hours of confirmed breach affecting user data, in compliance with GDPR Article 33
  • Post-incident review: root cause analysis and remediation steps published to affected users

Because documents are never stored, a database breach would not expose document content — only account metadata (email addresses, analysis result text, and project names).

Penetration Testing

We conduct annual penetration tests of Levlr's application and infrastructure. Tests cover OWASP Top 10 vulnerabilities, API authentication bypasses, injection attacks, and privilege escalation paths.

The most recent test was conducted in February 2026. No critical or high-severity findings were identified. Medium-severity findings were remediated within 14 days. Enterprise customers may request a summary of findings under NDA by contacting security@levlr.io.

Responsible Disclosure

We welcome reports from security researchers. If you discover a vulnerability in Levlr's application or infrastructure, please report it to security@levlr.io.

Our disclosure policy:

  • We will acknowledge receipt within 24 hours
  • We will provide a status update within 5 business days
  • We ask researchers to allow us 90 days to remediate before public disclosure
  • We will credit researchers in our changelog (with permission)
  • We do not pursue legal action against researchers acting in good faith

Please do not access, modify, or exfiltrate user data during testing. Test against your own account only.

Security Contact

For security reports, vulnerability disclosures, enterprise security questionnaires, or to request our penetration test summary or SOC 2 documentation:

  • Email: security@levlr.io
  • PGP key: available on request

For general privacy questions, see our Privacy Policy. For terms of use, see our Terms of Service.

Levlr · levlr.io · Security · Last updated March 13, 2026

Levlr

AI procurement intelligence for construction. Built for GCs, specialty subs, estimators, and AEC firms.

🔒 Documents never stored 🛡️ Never used to train AI 📋 GDPR & CCPA compliant

Product

  • Bid Leveling
  • RFQ Generator
  • Document Compare
  • Contract Review
  • PM Summary

Platform

  • Open App
  • Free Analysis
  • Pricing
  • FAQ
  • Contact Us

Legal

  • Privacy Policy
  • Terms of Service
  • Security
  • GDPR / CCPA
© 2026 Levlr. All rights reserved.
LinkedInTwitter / X[email protected]
Powered by Gemini 2.5 Flash