Credential boundary
Your banking credentials are entered into Plaid’s interface, not directly into Catalyst Cash.
Catalyst Cash is designed so your core financial record lives on your device first. This page explains what that means operationally, what leaves the device, and what controls you have.
Balances, debts, renewals, settings, and saved audits are stored on device by default.
AI calls and Plaid sync happen only when you choose those features.
Passcode, biometrics, privacy mode, backup, restore, and deletion controls live in the app.
Your balances, debts, renewals, settings, audit history, and most working finance context are kept locally as the primary record.
AI requests and Plaid-linked refreshes are networked operations. If you do not use them, those requests do not happen.
Passcodes, device identifiers, API-style secrets, and subscription-state details are excluded from manual backup files.
The app does not expose raw provider keys in the client. AI traffic is routed through the Catalyst backend proxy.
The app computes key finance logic locally before the AI layer is used for explanation and structured decision support.
Requests are scrubbed before being routed so the model sees less directly identifying financial context.
The product position is that raw financial payloads are not retained on Catalyst servers after request routing.
Plaid is optional. If you use it, it improves freshness. If you avoid it, the app still works with manual entry.
Your banking credentials are entered into Plaid’s interface, not directly into Catalyst Cash.
Plaid access-token handling stays off-device on the backend. The app primarily keeps local connection metadata and synced results.
You can stay fully manual if you prefer tighter control over what data ever leaves the device.
Lock the app with a passcode and supported biometric flows like Face ID so casual device access is not enough.
Chat persistence can be reduced or avoided, and saved history can be cleared when you want a shorter local footprint.
Encrypted exports and restore flows exist for portability without turning the product into a cloud-first finance database.
This page explains product design decisions. It is not a third-party certification, formal security audit, or legal substitute for the Privacy Policy and Terms of Service.
The trust page explains the operating model. The privacy page covers the legal handling language.