πŸ”’ Security Documentation

Security Whitepaper

How Value Adders World protects your data, ensures trustworthy AI operations, and maintains transparency in every decision our agents make.

Version: 1.0 | Last Updated: February 2026 | Classification: Public

🎯 1. Executive Summary

Value Adders World operates 150+ autonomous AI agents that take real actions on behalf of businessesβ€”sending emails, creating tasks, making decisions, and executing operations. This level of autonomy demands an equally robust security posture.

Our Security Philosophy: Every agent decision includes a complete audit trail. Every data point is encrypted. Every action is verified against our ADD VALUE Algorithm before execution. Transparency is not optionalβ€”it's architectural.

This whitepaper documents our security practices, data handling procedures, and the controls we've implemented to ensure your data remains protected while our agents work autonomously on your behalf.

πŸ—οΈ 2. Security Architecture

Our security architecture follows a defense-in-depth approach with multiple layers of protection:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ SECURITY LAYERS β”‚ β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ LAYER 5: APPLICATION SECURITY β”‚ β”‚ β”‚ β”‚ β€’ ADD VALUE Algorithm (ethical gate on every action) β”‚ β”‚ β”‚ β”‚ β€’ Input validation & sanitization β”‚ β”‚ β”‚ β”‚ β€’ Rate limiting & abuse prevention β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β–² β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ LAYER 4: DATA SECURITY β”‚ β”‚ β”‚ β”‚ β€’ AES-256-GCM encryption at rest β”‚ β”‚ β”‚ β”‚ β€’ TLS 1.3 encryption in transit β”‚ β”‚ β”‚ β”‚ β€’ Key rotation & management β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β–² β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ LAYER 3: ACCESS CONTROL β”‚ β”‚ β”‚ β”‚ β€’ API key authentication β”‚ β”‚ β”‚ β”‚ β€’ Role-based permissions β”‚ β”‚ β”‚ β”‚ β€’ Session management β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β–² β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ LAYER 2: NETWORK SECURITY β”‚ β”‚ β”‚ β”‚ β€’ HTTPS-only communication β”‚ β”‚ β”‚ β”‚ β€’ DDoS protection β”‚ β”‚ β”‚ β”‚ β€’ Firewall rules β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β–² β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ LAYER 1: INFRASTRUCTURE SECURITY β”‚ β”‚ β”‚ β”‚ β€’ Railway.app managed infrastructure β”‚ β”‚ β”‚ β”‚ β€’ Isolated container environments β”‚ β”‚ β”‚ β”‚ β€’ Automated security updates β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ” 3. Data Encryption

Encryption at Rest

All stored data is encrypted using industry-standard algorithms:

Data Type Encryption Standard Key Management
Customer data AES-256-GCM Per-customer keys
Agent memory (PathLog) AES-256-GCM Rotating keys
Audit logs AES-256-GCM Immutable storage
API credentials AES-256-GCM Environment secrets

Encryption in Transit

PathLog Integration: Our PathLog service provides enterprise-grade encrypted memory for all agent operations. Every piece of context an agent remembers is encrypted before storage and decrypted only when needed for decision-making.

πŸ”‘ 4. Access Control

Authentication

Authorization

Role-based access control (RBAC) ensures users and agents only access what they need:

Role Permissions
Admin Full access, user management, billing, agent configuration
Manager View all agent activity, approve high-impact decisions, reporting
Operator Interact with agents, view own activity, limited configuration
Viewer Read-only access to dashboards and reports
Agent Scoped to specific actions and integrations per customer

Principle of Least Privilege

Every agent operates with the minimum permissions required for its function. A marketing agent cannot access financial data. A reporting agent cannot send emails. Permissions are explicitly granted, never assumed.

🧠 5. AI Governance & The ADD VALUE Algorithm

Unlike traditional AI systems that operate as "black boxes," every Value Adders agent runs through our proprietary ADD VALUE Algorithm before taking any action.

The Creed: "Add value or don't act."

This is not a sloganβ€”it's implemented as a verification gate on every agent decision.

The 8-Pillar Decision Gate

Pillar Function Verification
A - Awareness Understand the situation fully Context quality score
D - Define Establish clear objectives Objective clarity index
D - Devise Design the simplest path Complexity reduction metric
V - Validate Confirm with evidence Evidence count & confidence
A - Act Upon Execute with commitment Execution completeness
L - Learn Extract feedback Feedback integration rate
U - Understand Recognize patterns Pattern recognition depth
E - Evolve Improve for next cycle Evolution tracking score

What This Means for Security

πŸ“Š 6. Data Handling & Retention

What Data We Process

Category Examples Purpose
Account Data Email, company name, billing info Account management, invoicing
Operational Data Tasks, emails, documents you share Agent execution on your behalf
Agent Memory Conversation context, decisions made Continuity and learning
Audit Logs Actions taken, timestamps, outcomes Transparency and compliance

Retention Policy

Data Deletion

You can request complete data deletion at any time. Upon request:

  1. Account access is immediately revoked
  2. All personal and operational data is queued for deletion
  3. Deletion is completed within 30 days
  4. Confirmation email sent upon completion
Important: Audit logs may be retained for legal compliance even after account deletion, but will be anonymized to remove personally identifiable information.

πŸ”— 7. Third-Party Services

We integrate with trusted third-party services to deliver our platform. Each integration is carefully evaluated for security:

Service Purpose Data Shared Security
OpenAI AI model inference Prompts, context SOC2, no training on customer data
Railway Infrastructure hosting Application data SOC2, encrypted storage
GitHub Code repository Source code only SOC2, private repos
Notion (if enabled) Task management Task data SOC2, OAuth scoped
Slack (if enabled) Notifications Messages SOC2, OAuth scoped

OpenAI Data Handling

No Training on Your Data: We use OpenAI's API with data retention disabled. OpenAI does not train on data sent through the API. Your business context remains private.

🚨 8. Incident Response

Our Commitment

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:

πŸ” Security Contact

Email: security@addvalue.ai

We aim to acknowledge reports within 24 hours and provide status updates within 72 hours.

πŸ“‹ 9. Compliance & Certifications

πŸ‡ͺπŸ‡Ί
GDPR

EU Data Protection

Compliant
πŸ”’
TLS 1.3

Transport Security

Active
πŸ›‘οΈ
AES-256

Encryption Standard

Active
πŸ“œ
SOC2 Type I

Trust Services

Q3 2026
πŸ›οΈ
ISO 27001

Information Security

2027
πŸ€–
EU AI Act

AI Regulation

Monitoring

Compliance Roadmap

We are actively pursuing additional certifications to meet enterprise requirements:

πŸ” 10. Transparency Commitment

Transparency is not an afterthoughtβ€”it's architectural. Here's what we commit to:

Every Agent Action Is Logged

When an agent sends an email, creates a task, or makes a decision on your behalf, you can see:

Human Override Always Available

Agents propose. Humans dispose. You can:

Open About Our Limitations

We're honest about what we're still building:

Our Promise: We will never hide behind complexity. If you ask why an agent did something, you will get a clear answer.

Questions About Security?

We're happy to discuss our security practices in detail.

security@addvalue.ai | Privacy Policy | GDPR Statement