Legal
Subprocessors
Last updated: April 1, 2026
How We Use Subprocessors
Enck relies on established service providers for infrastructure, security, payments, communications, AI capabilities, and connected workflows. We prefer managed services with their own mature operational controls rather than building and maintaining custom equivalents in-house.
Current List
| Provider | Purpose | Typical Data Involved |
|---|---|---|
| Vercel | Frontend hosting and edge delivery | Website traffic, application content, and operational telemetry needed to serve the web app. |
| DigitalOcean | Managed infrastructure for AgentOS services | Application runtime data, service logs, and operational state required for the agent backend. |
| Supabase | Primary application database and authentication services | Account records, workspace data, authentication events, and application state. |
| Stripe | Billing, subscriptions, and payment processing | Customer billing information, subscription status, payment metadata, and invoices. |
| OpenRouter | Managed model routing | Prompts, instructions, and related metadata required to fulfill AI tasks. |
| OpenAI | Embeddings and selected AI services | Text submitted for embedding or other customer-enabled AI features. |
| Composio | Connected account and tool orchestration | Integration metadata and workflow instructions for supported customer tools. |
| Twilio | SMS and telephony services | Phone numbers, message content, and call metadata for customer-enabled communications. |
| ElevenLabs | Voice generation and voice workflow services | Voice prompts, transcripts, and audio metadata needed for voice features. |
| Resend | Transactional and lifecycle email delivery | Email addresses and message content for product communications and updates. |
| RB2B | Website visitor identification and go-to-market attribution | Public website visit metadata used to identify business visitors and attribute acquisition traffic. |
| Browserbase | Remote browser automation | Browser session data generated by customer-enabled browser tasks. |
| Upstash | Rate limiting and operational infrastructure support | Request metadata used to protect platform availability and abuse controls. |
Changes to This List
We may update this list as the platform evolves, as vendors change, or as we add or retire features. Material updates are reflected by changing the revision date on this page.
Questions
If you need additional subprocessor details for procurement or security review, email hello@enck.ai.