FluxCybers
Help Center

Frequently Asked Questions

Everything you need to know about FluxCybers. Can't find what you're looking for? Email us at support@fluxcybers.com.

General 5 questions

FluxCybers is an AI-powered server automation platform. You describe what you need in plain English — FluxCybers connects to your servers via SSH, plans every step, and executes. No scripts, no manual SSH sessions, no guesswork. Think of it as having a senior DevOps engineer available 24/7 who executes infrastructure tasks instantly.

You add your server credentials (SSH key or password), then type commands in plain English in the AI console. FluxCybers uses Claude AI to interpret your intent, generate a step-by-step execution plan, asks for your approval, then executes directly on your servers. Everything is logged in an immutable audit trail.

Any Linux server accessible via SSH — VPS, bare metal, cloud VMs (AWS EC2, GCP, Azure, Hetzner, DigitalOcean, etc.). Supported distros: Ubuntu 20.04+, Debian 11+, CentOS/Rocky/AlmaLinux 8+, and most RHEL-compatible distributions.

No. SSH connection (password or key) works out of the box — no agent required. The optional agent enables faster status polling and non-SSH automation scenarios.

Both. Starter ($99/mo) is designed for solo admins managing up to 10 servers. Team ($399/mo) adds multi-user access, role-based permissions, and team approval workflows for growing ops teams.

Security & Compliance 5 questions

All SSH credentials, API keys, and secrets are encrypted at rest using AES-256-GCM — the same standard used by financial institutions. Credentials are decrypted only at execution time in memory and never logged.

AES-256-GCM for credentials at rest. TLS 1.3 for all data in transit. SSH connections use your provided credentials directly — we never generate or store root SSH keys.

Yes. Every action — command execution, login, credential access, settings change — is cryptographically hash-chained using SHA-256. Each record includes a hash of the previous record, making the chain tamper-evident. Any modification breaks the chain and is immediately detectable.

The platform's security architecture is SOC 2-adjacent (AES-256, 2FA, immutable audit logs, IP allowlisting, rate limiting, CSRF protection). Full SOC 2 Type II certification is on our roadmap for the enterprise tier.

Yes. The Audit Trail page provides chain integrity verification — you can verify that no log record has been tampered with since creation by checking the hash chain.

Pricing & Billing 6 questions

Free 1-hour trial (no card required), On-Demand packs (3hr/$10 to 10-day/$49), Starter subscription ($99/mo), Team subscription ($399/mo), and Enterprise (custom pricing). Security services are priced separately.

Full platform access for 1 hour. Pre-loaded with 3 demo servers showing realistic metrics, sample anomalies, and 150+ playbooks. Real AI command execution. No credit card required.

On-demand packs give you full platform access for a set number of hours (3h/$10, 5h/$20, 10h/$35, 30h/$89) or 10 days unlimited ($49). Hours never expire — buy once, use when you need. Perfect for occasional projects without committing to a subscription.

Individual/freelance pricing is one-time: we deploy and configure your security stack (SIEM, CWPP, SOAR) then hand it off to you. Business pricing is managed monthly: we run it 24/7 with continuous monitoring, SLA-backed incident response, and ongoing management.

Yes. Cancel from account settings anytime — no penalties, no questions. Access continues through end of billing period. On-demand packs never expire and remain in your account.

Monthly subscriptions billed on signup date each month. On-demand packs are one-time charges that never expire. Enterprise billed per custom agreement. All payments processed securely via Stripe.

Features 5 questions

Playbooks are pre-built automation scripts for common infrastructure tasks — Docker deployments, Nginx setup, database backups, SSL certificate renewal, security hardening, monitoring setup, and more. Run them with one click or customize for your environment.

150+ pre-built playbooks covering web servers, databases, containers, CI/CD, networking, security hardening, monitoring, backups, and more. Team and Enterprise plans include custom playbook creation.

Yes, on Team and Enterprise plans. Custom playbooks support parameterized inputs, multi-step execution, conditional logic, and can be shared across your team.

Type what you need in plain English. The AI (powered by Claude) interprets your intent, breaks it into atomic steps, shows you the execution plan for approval, then executes via SSH in real-time. You see live output as each step runs.

You define rules — e.g. "if CPU > 90% for 5 minutes, restart the service." When triggered, FluxCybers automatically executes the remediation playbook without you needing to be online. Full execution log recorded.

Partner Program 4 questions

Email partners@fluxcybers.com with your GitHub profile URL, LinkedIn profile, and a brief description of your clients/use case. We also accept freelance portfolio links or vendor license documentation. Review typically takes 24–48 hours.

Discounted security deployment rates (30–40% off standard pricing), ability to request client-facing quotes at partner rates (reseller model), commission credits on client referrals at full business pricing, and priority support.

You request a client quote from us at partner rates. We provide pricing. You bill your client at whatever margin you choose. For clients that come through at full business pricing directly, you earn commission credited to your account balance.

Partners earn a percentage commission on every client that converts at full business pricing. The exact commission rate is discussed during onboarding and depends on partner tier and volume. Credits are applied to your FluxCybers account balance.

Still have questions?

Our team typically responds within a few hours. Enterprise inquiries welcome.

support@fluxcybers.com