Skip to content

Security

Last Updated: March 30, 2026

NovoQuantNexus is built for researchers who need to trust that their molecular data stays private and their computational results stay secure. This page describes the technical measures we maintain to protect your data across the NovoMCP cloud platform, the NovoWorkbench desktop application, and all connected services.

Both Novo (ai.novomcp.com) and Novo Compute (compute.novomcp.com) operate within the same Azure security boundary with identical encryption, authentication, and audit controls.


1. Zero Research Data Retention

NovoMCP processes molecular queries in real time and does not retain your research data.

What we do NOT store: SMILES strings, molecular structures, search queries, tool parameters, tool results, docking poses, conformer ensembles, QM calculation outputs, AI conversations, or any intermediate computational data.

What we store: Account information, API key metadata (hashed), usage records (tool name, timestamp, credit cost), and pipeline audit records.

Query content is processed in memory and discarded after the response is returned to you. This applies to all 62 MCP tools across all compute services, including property prediction (pKa, solubility, BDE), quantum chemistry (xTB, CREST), neural network potentials (ANI-2x, MACE), molecular docking, molecular dynamics, and ADMET screening. We never log, store, or train on your molecular data.


2. NovoWorkbench Desktop Security

Local-First Architecture

NovoWorkbench runs core computational features entirely on your machine using bundled RDKit and a Python sidecar process. Workspace files, molecular data, session history, and computation results are stored locally and are never uploaded to NovoQuantNexus servers.

The application is signed and notarized for macOS (Apple Team ID: 8N9K9B7Y69).

Cloud-Connected Features

When you explicitly invoke cloud features, only the minimum data required for the request is transmitted — typically a SMILES string or search query. All communication uses TLS 1.2+ encryption. API keys are stored in the macOS Keychain, not in plaintext files or application storage.

AI Chat Providers

AI provider API keys are stored locally on your device and sent only to the provider you configure (Anthropic, OpenAI, Azure, or others). NovoQuantNexus does not intercept, proxy, or have access to your AI conversations. When using Ollama or other local models, no data leaves your machine.


3. Cloud Infrastructure Security

LayerProtection
Encryption in transitTLS 1.2+ on all endpoints
Encryption at restAES-256 for all databases and storage
API key storageSHA-256 hashed — plaintext keys are shown once at creation and never stored
Secrets managementAzure Key Vault for all service credentials and connector tokens
AuthenticationAzure AD + Entra ID for administrative access
Network architectureInternal service isolation; compute services (novomcp-properties, novomcp-qm, novomcp-nnp, autodock-gpu, gromacs-md) are not publicly exposed
Hosting regionMicrosoft Azure, East US
Payment processingStripe (PCI DSS Level 1 compliant)

Compute Service Isolation

All computational chemistry services run as isolated Azure Container Apps with internal-only ingress. They are contacted exclusively by the MCP gateway service (quanta-mcp) over internal network routes. No compute service accepts external traffic directly.

Each computation runs in an isolated scratch directory that is cleaned up after completion, preventing data leakage between concurrent requests from different users.


4. Authentication and Access Control

API Key Authentication

Every API request is authenticated with an API key (prefixed nmcp_). Keys are generated with cryptographically secure random bytes and stored as SHA-256 hashes only. Plaintext keys cannot be retrieved after creation.

Rate Limiting

TierDaily Request Limit
Free Trial100
Core1,000
Scale10,000
EnterpriseCustom

Rate limiting is enforced at the gateway level via Azure Redis Cache.

Administrative Access

Admin operations require Azure AD authentication with multi-factor authentication (MFA) enforced. All administrative actions are audit-logged. Access follows the principle of least privilege — no single administrator has unrestricted access to all systems.


5. Audit Logging

All tool invocations are recorded with: organization ID, user ID, tool name, credit cost, timestamp, and execution status. Audit logs do not contain query content, molecular data, or computation results.

Enterprise tier users with data connector pipelines maintain additional audit records for regulatory compliance, including 21 CFR Part 11 traceability. Pipeline audit records capture operation type, source/destination system, row counts, and timestamps — but not the molecular data itself.

Audit logs are available for export in CSV format for GxP documentation requirements.


6. Data Connector Security

Scale and Enterprise tier users may connect the Service to external data systems (Snowflake, Databricks, BigQuery, Supabase).

MeasureImplementation
AuthenticationOAuth 2.0 with PKCE
Credential storageAzure Key Vault
Token managementAutomatic rotation
Data handlingResults streamed, not cached or persisted
Row limitsEnforced per tier (max 10,000 rows per operation)
AuditAll connector operations logged

NovoQuantNexus acts as a pass-through processor for connected data. We do not cache, index, or retain data pulled from your systems beyond the duration of the active computation.


7. Data Retention

Data TypeRetention
Account informationUntil account deletion
API key metadataUntil revocation + 30 days
Usage and billing records90 days
Pipeline audit recordsUntil account deletion
Error logs30 days
Payment recordsAs required by applicable tax and financial regulations
Query content and resultsNot retained — processed in memory only

Upon account deletion, API keys are revoked immediately, account information is deleted within 30 days, and usage records are deleted within 90 days.


8. GDPR and International Data

NovoMCP is hosted in Microsoft Azure, East US region. For users in the EU/EEA, Switzerland, and the United Kingdom, we process data under legitimate interest and provide the following rights under GDPR: access, rectification, erasure, portability, restriction of processing, and objection.

To exercise any of these rights, contact privacy@novoquantnexus.com.

Enterprise customers may request a Data Processing Agreement (DPA) that includes European Commission-approved standard contractual clauses for international data transfers.


9. Third-Party Services

The following third-party services are used in the operation of NovoMCP:

ServicePurposeReceives Molecular Data?
Microsoft AzureCloud infrastructure, compute, databaseNo — molecular data processed in memory only
Azure SQL DatabaseAccount metadata, usage recordsNo
Azure Redis CacheRate limiting, session managementNo
Azure Key VaultSecrets and credential managementNo
Azure Blob StorageModel checkpoints, training data (NovoQuantNexus-owned)No user data stored
StripePayment processingNo
ResendTransactional emailNo

No third-party service receives molecular data, research content, or computation results. We do not use third-party analytics, advertising, or behavioral tracking services.


10. Incident Response

In the event of a security incident:

  1. Notification. We will notify affected users within 72 hours of becoming aware of the incident.
  2. Regulatory reporting. We will report to relevant authorities as required by applicable law.
  3. Containment. Immediate steps to contain and remediate the incident, including isolation of affected systems.
  4. Credential reissuance. If credential exposure is suspected, affected API keys will be revoked and users will be prompted to generate new keys.
  5. Post-incident report. A summary of the incident, its scope, root cause, and remediation steps will be published to affected users.

11. Compliance Status

Certification / StandardStatus
TLS 1.2+ encryption in transitActive
AES-256 encryption at restActive
Audit logging (tool invocations, admin actions)Active
GDPR complianceActive
macOS code signing and notarizationActive (Team ID: 8N9K9B7Y69)
SOC 2 Type IPlanned
SOC 2 Type IIPlanned
Penetration testingPlanned
HIPAA BAAAvailable on request (Enterprise)

We do not claim SOC 2 Type II certification. When referencing our security posture, we describe our current controls (signed and notarized application, local-first architecture, zero research data retention, encryption in transit and at rest) rather than certifications not yet completed.


12. Responsible Disclosure

If you discover a security vulnerability in NovoMCP or NovoWorkbench, please report it to security@novoquantnexus.com. We ask that you provide us with reasonable time to investigate and address the issue before public disclosure. We will acknowledge receipt within 48 hours and provide an initial assessment within 5 business days.


13. Contact

Security: security@novoquantnexus.com

Privacy: privacy@novoquantnexus.com

General: ari@novoquantnexus.com

Website: novoquantnexus.com