Encryption in transit and at rest
Warm uses industry-standard encryption for data in transit and at rest, including bank connection data returned through Plaid.
Warm is designed for visibility and understanding: encrypted data, Plaid bank connections, no stored bank credentials, and optional MCP access that stays scoped.
Access model
The same read-only posture applies to the dashboard and optional MCP clients. Warm can read the financial context you authorize, but it cannot make payments, transfer funds, or edit bank accounts.
You authenticate directly with your financial institution through Plaid.
Plaid returns account and transaction data without sharing bank credentials.
Warm stores the financial context needed to show balances, trends, and alerts.
Supported clients can query read-only tools only after you create an API key.
Controls
Warm uses industry-standard encryption for data in transit and at rest, including bank connection data returned through Plaid.
Warm can view account balances and transactions. It cannot initiate transfers, make payments, or change bank accounts.
Bank usernames and passwords are never stored by Warm. Authentication is handled by Plaid and your financial institution.
Production systems use managed cloud infrastructure, restricted access, monitoring, and routine security updates.
Warm does not sell financial data or share it with advertisers. Your data is used to provide the service.
You can disconnect bank accounts, delete API keys, or delete your Warm account when you no longer want access enabled.
Plaid handles the secure connection between Warm and supported financial institutions. When you connect a bank, authentication happens through Plaid and your bank; Warm does not receive or store your bank username or password.
You can disconnect accounts in Warm or manage Plaid connections through my.plaid.com .
MCP security
Warm MCP gives supported clients read-only financial context through scoped API keys and
the local @warmio/mcp package.
Clients can answer questions from your data, but they cannot move money or edit records.
MCP access only works after you create an API key and connect a supported client.
API keys are scoped to your Warm account data and can be revoked from Settings.
Clients can query data. They cannot move money, edit records, or change settings.
Your money stays protected because Warm does not store bank credentials and does not have transfer permissions. A security incident would not give an attacker the ability to log into your bank, initiate payments, or move funds through Warm.
Plaid powers bank connections for many financial apps. It handles authentication directly with your bank and does not share your bank credentials with Warm.
Warm has read-only access to account balances and transactions. We cannot initiate transfers, make payments, or modify anything in your accounts.
You can delete your account from Settings. When you delete your account, Warm revokes bank connections and deletes account data associated with the service.
No. Warm does not sell financial data, share it with advertisers, or use it for purposes outside providing the Warm service.
No. Warm MCP is documented here as the local @warmio/mcp package using scoped API keys.
Connect accounts through Plaid and keep control of what Warm can access.