Research
Financial AI security and compliance
December 2025
Security architecture
The stack uses a layered security model to protect user assets and sensitive data.
API key handling
- Encrypted storage: Keys are encrypted and stored locally
- Least privilege: Exchange keys are scoped to trading/read—no withdrawals
- IP allowlists: Users should enable IP restrictions on the exchange side when available
- 2FA: Two-factor authentication is required for exchange accounts
- Rotation: Periodic key rotation and permission review
Data protection
- Local-first: Sensitive data stays local; no cloud sync of secrets by default
- Encryption: Configuration and tokens at rest are encrypted where applicable
- Anonymization: Public trade logs remove personal identifiers completely
- Access control: OS-level permissions restrict who can read local files
Regulatory alignment
Not investment advice
NoahAI Labs does not provide investment advice. Tools support user judgment; users remain responsible for decisions.
- Disclaimers: Non-advice language appears across relevant surfaces
- No guaranteed returns: We do not promise performance outcomes
- Risk disclosure: Clear risk communication where required
- User responsibility: Final accountability for trades remains with the user
Data protection practices
- Data minimization: Collect only what is needed to operate
- Anonymization: Published data is anonymized at pattern level
- Retention: Retention policies are explicit for local operational data
- Deletion: Support user-initiated deletion workflows where applicable
Auditability
Structured logging
Judgments and executions are recorded in standardized formats so reviews can be systematic.
- DecisionLog: Rationale and context for judgment calls
- ExecutionResult: Execution outcomes with timestamps
- RiskEvent: Risk events and responses
- XAITrace: Traceable rationale for AI-assisted decisions
Reproducibility
- Standardized schema: Logs follow a consistent schema
- Versioning: System and configuration versions are recorded
- Replay: Records support replay under stated assumptions
- Third-party review: Evidence can be audited by external reviewers
Public R&D and investor lens
Regulatory adaptability
The compliance posture is designed to adapt as requirements evolve.
- Modular controls: Security policies can be updated independently
- Standardized audit logs: Log formats can be adjusted to match program requirements
- Flexible access control: RBAC-style patterns as deployments mature
- Stronger protection: Data controls can be tightened for new rules
Enterprise readiness
The model is designed with enterprise adoption in mind.
- SSO: Integrations for corporate SSO where applicable
- RBAC: Role-based access patterns
- On-prem options: Deployable inside private networks for institutions
- SLA: Service-level agreements for enterprise deployments
- Audit logs: Internal controls and external audit support
Conclusion
Security and compliance in this stack combine layered security, regulatory alignment, and auditability to protect users and adapt to changing requirements.
For public R&D and investors, these properties support claims of regulatory adaptability, enterprise readiness, and trustworthiness.