Wexford Intelligence

Security

Last updated: May 3, 2026

Service security model

Wexford Intelligence uses a least-privilege model for source access, credential handling, and delivery endpoints. Access to client delivery spaces is restricted to named users and operationally needed maintainers.

Data handling

Client outputs are delivered per tenant with separation of datasets, run history, and file access paths. Credentials and API keys are stored in environment-managed secrets and are never embedded in public pages.

Operational controls

  • Source health checks and run-level validation before publish.
  • Schema checks and exception outputs for review.
  • Access revocation and account rotation for offboarding.
  • Audit-friendly run identifiers on published outputs.

Responsible disclosure

Security questions or reports may be sent to hello@wexford-intelligence.com. Please include reproduction steps and impacted endpoint details.