Security at HYPX

HYPX is trading automation software. Security and permission boundaries are core to the product.

Key Security Principles

  • Non-custodial model: users control funds; HYPX does not hold customer assets.
  • Trade-only permissioning: app access is scoped for trading workflows.
  • Least privilege: only required operations are enabled for runtime actions.
  • Session security: auth is validated server-side on protected endpoints.

Authentication

HYPX uses Privy-based authentication (Google, email, passkey). PWA standalone mode supports valid-session continuation to avoid unnecessary auth loops while keeping token checks in place.

Risk Notice

Trading crypto is high risk. Past performance and backtests are not guarantees of future outcomes. Only trade with capital you can afford to lose.