No arbitrary SQL. Ever.
Datatape enforces security at the platform level — not by convention, by architecture. AI agents can only call tools you define, with SQL templates you wrote, using parameters you validated. They never touch your credentials or construct their own queries.
How Datatape handles your data
Access control
Role-based access (RBAC)
Authentication
WorkOS-powered SSO (SAML, OIDC, Google, Microsoft, GitHub)
API keys with dt_ prefix, scoped per server
MCP endpoint auth via Bearer token or API key
API key isolation
Each API key is scoped to a specific server
Keys are hashed (SHA-256) before storage — raw keys cannot be retrieved after creation
Keys can be revoked instantly
Encryption
Audit logging
Every tool execution is recorded
What's logged
- Who — authenticated user or API key
- What — which tool, with what parameters
- When — timestamp
- Result — success/failure, error message, row count, execution time
- Where — which MCP server, which database connection
Retention by plan
Infrastructure
Shared responsibility
Security FAQ
No. Query results are returned to the caller and not persisted by Datatape. They are not cached, not used for training, and not shared across organizations.
No. AI agents can only call tools you define. Each tool has a fixed SQL template with parameterized inputs. The SQL is validated by SQLGlot to be read-only — INSERT, UPDATE, DELETE, and DROP are rejected at the platform level.
Datatape employees cannot see your query results. Database credentials are encrypted and not accessible in plaintext through any admin interface. Infrastructure access is limited to essential personnel and logged.
Tools stop working immediately. Datatape has no cached copy of your data. Revoke the database credentials you provided, and access is fully terminated.
Yes. Datatape uses WorkOS for authentication, which supports SAML 2.0, OIDC, Google Workspace, Microsoft Entra ID, and GitHub. SSO is available on the Enterprise plan.
Email security@datatape.io. We take all reports seriously and will respond within 48 hours. We welcome responsible disclosure and will not take legal action against good-faith security research.
Security inquiries
For security questions, vulnerability reports, or to request a pre-filled security questionnaire.
security@datatape.io