Everyone's talking about AI adoption. Almost nobody has the real numbers. Help us change that — and get the full report 👉 Engineers | Leaders

security

Last updated: February 2026


Latent Patterns is a small, deliberately simple service. We minimise our attack surface by minimising what we collect and what we run. This page describes how we protect your data and what you can expect from us.

1. infrastructure

Latent Patterns runs on Cloudflare Pages using the Workers runtime (V8 isolates) deployed across Cloudflare's global edge network. There is no single origin server — requests are handled at the nearest Cloudflare data centre.

2. data storage

User data is stored in PlanetScale PostgreSQL, accessed via Cloudflare Hyperdrive connection pooling. The database is not directly exposed to the internet — it is accessible only through Hyperdrive bindings in the Workers runtime.

3. authentication

We use passwordless authentication. There are no passwords to leak, brute-force, or reuse. The primary sign-in method is LinkedIn. You can also sign in with another OAuth provider or a magic link sent to your email.

LinkedIn (primary)

other OAuth providers

magic links

sessions

admin authentication

4. third-party services

We use the following third-party services:

We do not use third-party analytics, advertising networks, tracking pixels, or any service that profiles our users. We do run a first-party event and pageview measurement system for product analytics, reliability, and journey analysis.

5. rate limiting

API endpoints, authentication, support, and newsletter routes are rate-limited by IP address using a sliding window with limits appropriate to each route category. Content browsing routes are not rate-limited.

Rate-limited responses return a 429 status with a Retry-After header. Airwallex and Resend webhooks are exempt from rate limiting as they are verified by cryptographic signature.

6. data retention

7. application security

8. what we don't do

9. cookies

We use a small number of first-party cookies. No third-party cookies.

We do not currently honor browser Do Not Track (DNT) or Global Privacy Control (GPC) signals.

10. observability and telemetry

We use Honeycomb for application observability and Sentry for error tracking — monitoring service health, request latency, error rates, and reliability via Service Level Objectives (SLOs).

11. reporting a vulnerability

If you discover a security vulnerability, please report it responsibly. Do not open a public issue.

We publicly acknowledge researchers who help improve our security on our security hall of fame. Qualifying researchers receive one year of free access to the platform.

Our security.txt is available at the standard well-known URI.

safe harbor

When conducting vulnerability research according to this policy, we consider this research to be:

You are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through one of our Official Channels before going any further.

Note that the Safe Harbor applies only to legal claims under the control of the organization participating in this policy, and that the policy does not bind independent third parties.

12. contact

For security questions or concerns: security@latentpatterns.com