MDX Limo
Data Stores (In Scope)

Data Stores (In Scope)

StoreTechnologyPurposeAccess Control
Supabase (Auth + Postgres)Hosted PostgreSQL/AuthUser identity, sessions, OAuth connection recordsRow-Level Security (RLS), service-role controls, TLS in transit
Browser Session ContexthttpOnly auth cookies/session stateSession continuity for authenticated web requestsCookie/session controls via auth platform; HTTPS transport

Data Categories (Web Auth)

1. Authentication Credentials

Classification: Critical

AttributeDetail
Data typesOAuth access/refresh tokens (Google), Supabase JWT access/refresh tokens, server-side auth secrets
StorageSupabase connection/auth tables and server-side environment variables
EncryptionOAuth tokens encrypted at rest (AES-256-GCM) and TLS in transit
AccessRLS per-user access; service role restricted to trusted server-side contexts
RetentionUntil disconnect, account deletion, or token rotation/expiry

2. Identity and Profile Data

Classification: Sensitive

AttributeDetail
Data typesName, email address, phone verification state, timezone, profile metadata needed by web auth/account settings
StorageSupabase profiles and auth-linked identity records
EncryptionTLS in transit; platform-managed encryption at rest
AccessRLS ownership enforcement for user-scoped access
RetentionUntil account deletion or user-initiated profile removal

3. OAuth Connection Metadata

Classification: Sensitive

AttributeDetail
Data typesProvider account identifiers, granted scopes, token expiry metadata, connection state
StorageSupabase provider connection tables
EncryptionTLS in transit; sensitive token fields encrypted at rest
AccessRLS per-user; server-side access only for token refresh/exchange logic
RetentionUntil user disconnects provider or deletes account

4. Authentication Operational Metadata

Classification: Internal

AttributeDetail
Data typesAuth request outcomes, rate-limit outcomes, security event metadata (without credentials)
StorageAuth provider/web operational logs
EncryptionTLS in transit to logging/monitoring systems
AccessRestricted operational/admin access
RetentionPer platform and operational retention policy

Protection Level Summary

LevelExamplesBaseline Protection Requirements
CriticalOAuth tokens, session tokens, auth secretsStrong encryption at rest and in transit, strict least-privilege access, non-logging of secrets, rotation controls
SensitiveIdentity/profile data, OAuth connection metadataRLS ownership checks, TLS transport, minimized exposure, retention controls
InternalAuth operational metadataRestricted access, no credential content, controlled retention

Control Mapping (Web Auth)

Control AreaWeb Auth Requirement
Encryption at RestOAuth token fields encrypted using AES-256-GCM in persistence layer
Encryption in TransitTLS required for browser-to-web, web-to-supabase, and web-to-provider communication
Access ControlRLS ownership model for user-scoped data; service role limited to server-side trusted paths
Secret HandlingSecrets and keys held in environment variables; never exposed client-side
Retention/LifecycleTokens and provider links retained only while active; removed on disconnect/deletion
Abuse ProtectionRate-limiting and anti-automation controls on auth-sensitive endpoints