Tenant isolation
Every record in Parapet is scoped to an organization. Isolation is enforced by Postgres Row Level Security policies on every table, keyed to the membership of the requesting user. Application code executes against the database with the user’s own JWT, so a query that tries to reach data outside the user’s organization fails at the database layer — not just in application logic.
A small number of background jobs (for example, the Stripe webhook handler and the worker pipeline) run with elevated credentials. Each such code path is reviewed for an explicit reason and is annotated in source.