Authentication stays explicit
Owners and staff sign in through the app and approved external systems use scoped credentials rather than anonymous access.
Residential HVAC missed-call recovery
Keep working. We’ll handle the callback.
Docs / Security
CallSnare keeps discovery public and useful while making protected work explicitly authenticated, authorized, rate-limited, and backed by persistent evidence.
Security here is not just about blocking requests. It is also about keeping the product explainable after retries, failures, and high-risk changes happen.
Security posture
Authentication stays explicit
Owners and staff sign in through the app and approved external systems use scoped credentials rather than anonymous access.
Incoming traffic is treated like real provider traffic
Callbacks are validated, rate-limited, and designed around retry behavior instead of assuming one clean delivery.
Evidence closes the loop
Webhook logs, lead events, audit entries, and billing records make the outcome reproducible later.
Public understanding is encouraged so machines and partners do not need to scrape the UI.
Real business actions require explicit credentials, role gates, and scope checks.
Critical activity should be reconstructable later from stored records, not memory.
Identity and access
CallSnare keeps the distinction clear: staff sign into the web app, while approved external systems use org-scoped credentials with explicit scopes.
Staff users sign in through the web app. Approved external systems use org-scoped Bearer credentials created by an owner or admin.
Organization membership roles gate the web app. External credentials are limited by explicit scopes and can be rotated or revoked.
Traffic safety
The system expects real provider behavior: at-least-once delivery, retry storms, and the need to return quickly while still preserving evidence.
Webhook and protected API routes use request rate limiting so replay storms or noisy traffic do not turn into uncontrolled load.
Voice/SMS provider and Stripe webhook signature validation can be enforced when live integration mode is enabled.
Evidence and defaults
The product stays safer because the broadest machine-facing surface is not public, and important changes are expected to leave a trail.
Settings changes, lifecycle changes, and webhook evidence are persisted so the team can explain what happened after the fact.
Protected access is narrow, write actions stay permissioned, and no public broad action layer is exposed today.
Continue reading
After this page, most readers want to connect the posture to the real role model, the action surface, or the provider callback model.
Permissions
See how roles, scopes, and tenant boundaries enforce the operational access model.
Actions
Review which capabilities are protected, which remain internal, and which are only planned.
Webhooks
Understand the inbound callback routes and why they are treated as provider surfaces, not public customer APIs.
Agent access
Check the boundary between public discovery and protected machine-facing work.