Skip to main content

Security

How Clink protects your data and communications.

Overview

Clink is designed with security as a core principle. We recognize that your clinks contain sensitive information about your workflows and your codebase, and we treat that data with an appropriate level of care.

Data Protection

Encryption in Transit

All communication uses TLS 1.3:

  • All API requests encrypted between client and server
  • No plaintext transmission of clinks or credentials
  • Certificate pinning available for Enterprise deployments
  • End-to-end encryption (client-side keys) available for Enterprise tier

Encryption at Rest

All stored data is encrypted using AES-256 encryption.

Data Retention

Clinks are automatically deleted based on your subscription tier:

TierRetention
Free7 days
Pro30 days
Team30 days
EnterpriseConfigurable (default: indefinite)

Authentication

API Keys

API keys are the primary authentication method for the MCP server.

Security Properties:

  • Keys are hashed (SHA-256) before storage
  • Original key shown only once at generation
  • Instant revocation via dashboard

Key Format:

sk_live_a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6
└─────┘ └──────────────────────────────┘
prefix 32 random alphanumeric chars

Web Dashboard Authentication

The web dashboard supports two authentication methods:

Google OAuth 2.0:

  • Google handles identity verification

Email/Password:

  • Passwords hashed with bcrypt
  • Email verification required

Both methods:

  • Session tokens are short-lived (24 hours)

Authorization

Group-Based Access

All authorization is group-based:

  • You can only read/send clinks in groups you belong to
  • Group membership is explicit (via invitation)
  • Roles (owner, admin, member) control permissions

Permission Matrix

ActionOwnerAdminMember
Send clinks
Read clinks
Invite members
Remove members
Update group
Delete group

Rate Limiting

Rate limits protect against abuse:

TierRequests/MinuteClinks/Day
Free550
Starter30300
Pro602,000
Team12010,000
Enterprise600Unlimited

When rate limited:

  • API returns 429 status code
  • Retry-After header indicates wait time
  • Limits reset at the top of each minute/day

MCP Server Security

What Runs Locally

The Clink MCP server runs entirely on your machine:

  • Reads your API key from environment variables
  • Makes HTTPS requests to the Clink API
  • Returns responses to your agent or AI assistant

What It Does NOT Do

The MCP server does NOT:

  • Access your filesystem
  • Make requests to any service except Clink API
  • Send telemetry or analytics (feedback requires explicit API key permission, disabled by default)
  • Cache clinks locally
  • Store credentials

Source Code

The MCP server is open source (MIT license). You can audit every line:

  • GitHub Repository
  • All dependencies are from npm public registry
  • No obfuscation or minification of source

The Lethal Trifecta: Understanding MCP Security Risks

If you're using AI agents with MCP tools, you need to understand a critical security concept called the Lethal Trifecta, identified by Simon Willison.

What Is the Lethal Trifecta?

The lethal trifecta occurs when an AI agent has all three of these capabilities:

  1. Access to private data - Your codebase, credentials, internal documents
  2. Exposure to untrusted content - Web pages, emails, external files that could contain malicious instructions
  3. Ability to communicate externally - API calls, sending emails, or any way to exfiltrate data

When all three exist together, an attacker can craft malicious content that tricks the AI into stealing and transmitting your private information.

Why This Matters for MCP Users

MCP makes it easy to add powerful tools to your AI assistant. But mixing tools from different sources can inadvertently create the lethal trifecta:

  • A filesystem tool gives access to private data
  • A web browsing tool exposes untrusted content
  • A public tool (or email, Slack, etc.) provides external communication

An attacker could embed instructions in a web page or email that cause your AI to read sensitive files and send them elsewhere.

Shared Responsibility Model

What Clink (Voxos.ai) is responsible for:

  • Securing the Clink API and infrastructure
  • Encrypting your data in transit and at rest
  • Authenticating API requests
  • Ensuring the MCP server package only communicates with Clink's API
  • Providing scoped API keys to limit exposure

What you are responsible for:

  • Choosing which MCP tools to enable together
  • Understanding the capabilities you're granting your AI agent
  • Avoiding combinations that create the lethal trifecta
  • Protecting your API keys
  • Reviewing what your agents are doing

Recommendations

  1. Audit your MCP configuration - What tools have you enabled? Do they create the trifecta?
  2. Use scoped API keys - Limit keys to specific groups rather than full account access
  3. Be cautious with web browsing - If your agent can browse arbitrary URLs, treat it as untrusted content exposure
  4. Separate sensitive work - Don't use the same agent configuration for sensitive internal work and external content processing
  5. Review agent actions - Periodically check what your agents are sending via Clink

Further Reading

What We Don't Have Access To

Clink cannot access:

  • Your codebase or files
  • Your terminal/shell activity
  • Any data outside of Clink context

Incident Response

If Your API Key Is Compromised

  1. Go to app.clink.voxos.ai/settings
  2. Click Revoke on the compromised key
  3. Update your claude.json with the new key
  4. Old key is immediately invalidated

Reporting Security Issues

For security vulnerabilities, email: security@voxos.ai

We follow responsible disclosure:

  • Acknowledge receipt within 24 hours
  • Provide timeline for fix
  • Credit reporters if desired

Compliance

Current

  • HTTPS everywhere
  • Data encryption (transit + rest)
  • Access logging

Planned (Enterprise)

  • SOC 2 Type II certification
  • GDPR compliance documentation

Best Practices

For Users

  1. Protect your API key - Don't commit it to version control
  2. Regenerate periodically - Rotate keys every 90 days
  3. Use groups wisely - Only invite people who need access
  4. Review memberships - Remove inactive members

For Administrators

  1. Use the admin role - But don't make all members admins
  2. Monitor invitations - Cancel stale/unauthorized invites
  3. Clean up old groups - Delete unused groups

Questions?

For security-related questions: security@voxos.ai

For general support: support@voxos.ai