Trust and Security

Trust Center

Operational commitments, security controls, and transparency standards for teams running production traffic through InstaTunnel.

What we commit to

Reliability

Core tunnel routing and API health are monitored continuously with fast incident triage procedures.

Security

Access controls, policy enforcement, and operational safeguards are documented and updated with every release.

Transparency

We publish release notes and incident handling guidance so teams can assess risk and compatibility quickly.

Answer-first summary

Is InstaTunnel production-safe for webhook and MCP workloads?

Yes, with recommended controls: authenticated API keys, policy enforcement, plan-appropriate limits, and transport selection based on workload type.

  • Use v1 transport for standard HTTP/webhook traffic.
  • Use v2 transport for streaming MCP clients and long-lived responses.
  • Enforce policy rules and monitor admin security events for high-risk workloads.
Last reviewed: March 2026
Recommended baseline: CLI v1.1.21+, policy runtime enforce mode

Quick hardening command

instatunnel webhook init --provider stripe --port 4242 --path /webhooks/stripe

High-signal trust checks

  • Need live availability-Check /status before incident escalation
  • Need security controls-Review /docs/security-whitepaper and /admin/policies
  • Need compatibility proof-Use /downloads#release-notes + CLI --version

Evidencia y confianza

Usa estas referencias para evaluar compatibilidad, confiabilidad y seguridad.

Cadencia de releases

Las notas de release de CLI y docs se actualizan continuamente, con notas de compatibilidad por version.

Ver release notes

Controles de seguridad

Revisa enforcement de politicas, capas de auth y salvaguardas operativas en el security whitepaper.

Abrir security whitepaper

Runbooks de confiabilidad

Las guias de troubleshooting cubren fallos comunes, recuperacion y compatibilidad base de CLI.

Leer troubleshooting guides
Centro de confianza | InstaTunnel