Trust and Security

Trust Center

Operational commitments, security controls, and transparency standards for teams running production traffic through InstaTunnel.

What we commit to

Reliability

Core tunnel routing and API health are monitored continuously with fast incident triage procedures.

Security

Access controls, policy enforcement, and operational safeguards are documented and updated with every release.

Transparency

We publish release notes and incident handling guidance so teams can assess risk and compatibility quickly.

Answer-first summary

Is InstaTunnel production-safe for webhook and MCP workloads?

Yes, with recommended controls: authenticated API keys, policy enforcement, plan-appropriate limits, and transport selection based on workload type.

  • Use v1 transport for standard HTTP/webhook traffic.
  • Use v2 transport for streaming MCP clients and long-lived responses.
  • Enforce policy rules and monitor admin security events for high-risk workloads.
Last reviewed: March 2026
Recommended baseline: CLI v1.1.21+, policy runtime enforce mode

Quick hardening command

instatunnel webhook init --provider stripe --port 4242 --path /webhooks/stripe

High-signal trust checks

  • Need live availability-Check /status before incident escalation
  • Need security controls-Review /docs/security-whitepaper and /admin/policies
  • Need compatibility proof-Use /downloads#release-notes + CLI --version

Evidence and trust

Use these references when evaluating compatibility, reliability, and security posture.

Release cadence

CLI and docs release notes are updated continuously, with version-specific compatibility notes.

View release notes

Security controls

Review policy enforcement, auth layers, and operational safeguards in the security whitepaper.

Open security whitepaper

Reliability runbooks

Troubleshooting guides cover common failures, recovery steps, and CLI compatibility baselines.

Read troubleshooting guides
Trust Center | InstaTunnel