- https://avnu.fi, https://app.avnu.fi and all related subdomains,
- our trading interfaces, router, paymaster, intents engine and staking dashboards,
- our APIs, SDKs, analytics pages or other web applications,
- and any other properties, features, tools or services made available by avnu
1. High-Level Summary
avnu is a non-custodial interface and infrastructure provider.We DO NOT Collect
- First/last name
- Postal address
- Date of birth
- Email address
- Private keys / seed phrases
We DO Collect
- Public on-chain data (wallet address, transactions)
- Quote-level and swap-level logs
- Limited off-chain analytics data
- Technical and performance diagnostics
We never sell user data.
We minimize collection wherever possible.
We continuously work to integrate privacy-preserving tooling (proxies, anonymization, local-first analytics, opt-outs).
2. Information We Collect
We categorise the data we collect into three groups:2.1 Public On-Chain Data (Non-Personal Data)
When you interact with the Services, we may automatically read or process:- wallet addresses,
- transactions you sign,
- token balances,
- routes executed via avnu,
- events and logs emitted by smart contracts,
- on-chain states required to compute quotes.
This information is public by design. We do not control or modify blockchain transparency.
2.2 Technical & Device Information (Pseudonymous Off-Chain Data)
We collect limited, pseudonymous technical metadata such as:- browser type and version
- device type (mobile, tablet, desktop)
- language preferences
- pages visited, clicks, UI interactions
- timestamps & session duration
- network performance metrics
- referrers and URL paths
- aggregated usage statistics
2.3 Operational, Routing & Security Data
To provide high-performance routing and maintain platform integrity, we log:- quote requests and parameters,
- swap attempts, success and failure metrics,
- slippage settings, route selections, transaction hashes,
- suspicious or abusive patterns (e.g., spam queries, scraping, automated flooding),
- API key usage patterns (if integrating via Developer Tools),
- errors, exceptions and performance bottlenecks.
- improve routing quality,
- protect the system from abusive or malicious behaviour,
- detect anomalies,
- maintain network reliability,
- enforce rate limits and prevent platform degradation.
3. How We Use Data
We use the data we collect for the following purposes:3.1 Providing and improving the Services
This includes:- computing quotes, routes, gas estimations, and simulations,
- operating the router, paymaster, staking dashboard, and on-chain interactions,
- monitoring app stability and infrastructure performance,
- building analytics that help us improve swap routing and execution,
- upgrading our systems and features based on usage patterns.
3.2 Customer support
We may use technical logs and public blockchain data to:- troubleshoot user-reported execution issues,
- diagnose errors or routing anomalies,
- provide explanations or insights into expected vs. actual execution.
3.3 Safety and security
We may use data to:- detect and prevent abusive or fraudulent behaviour,
- investigate bugs, exploits or suspicious patterns,
- block harmful traffic or compromised wallets,
- maintain platform reliability.
3.4 Legal obligations
We may process or share information where:- required by law,
- requested by regulators, law enforcement or competent authorities,
- necessary to comply with sanctions, AML/CTF obligations (where applicable),
- necessary to enforce our Terms & Conditions.
3.5 Aggregated & anonymized analytics
We may combine or anonymize datasets to:- analyse product usage,
- identify trends,
- measure system performance,
- guide product development decisions.
4. How We Share Data
We share only the minimum necessary information with the third-party tools we use:4.1 Service Providers
Sentry Used for:- application monitoring,
- error tracking,
- debugging performance issues.
- understanding how users interact with the app,
- improving UI/UX,
- identifying performance bottlenecks,
- conducting anonymized behavioural analysis.
- hosting,
- serverless execution,
- CDN delivery of the front-end interface.
4.2 Legal disclosures
We may share information if:- required by law,
- necessary to comply with sanctions or AML rules,
- responding to subpoenas, regulatory inquiries, or lawful investigations,
- needed to protect our rights, users, or the integrity of the Services.
4.3 No sale of data
We never sell or rent user data.5. Legal Bases for Processing (GDPR)
Where GDPR applies, we process data based on one or more of the following legal bases:| Legal Basis | Description |
|---|---|
| Consent | When you use our Services or accept cookies |
| Contract performance | To operate the router, paymaster, staking dashboard, or API |
| Legal obligations | Complying with applicable laws or regulatory inquiries |
| Legitimate interest | Improving the Services, ensuring security, preventing abuse, and generating anonymized analytics |
6. Your Rights (GDPR & Equivalent Frameworks)
Where applicable, you have the right to:| Right | Description |
|---|---|
| Access | Request a copy of personal data we may hold |
| Rectify | Request corrections to inaccurate information |
| Erase | Request deletion of personal data (subject to legal allowances) |
| Restrict processing | Request limits on certain forms of processing |
| Object | Object to processing based on legitimate interest |
| Data portability | Receive data in a structured, machine-readable format |
| Withdraw consent | At any time, where processing is based on consent |
7. Data Retention
We retain data only as long as needed to:- operate the Services,
- comply with legal obligations,
- detect and prevent abuse,
- resolve disputes,
- improve performance and routing quality.
8. Data Security
We implement reasonable technical and organizational measures to protect data, including:- encrypted communications (HTTPS),
- strict access controls,
- minimal data collection by design,
- ongoing audits of analytics providers,
- infrastructure security hardening.
However, no system can guarantee perfect security. We do not control the security of blockchains or user wallets.
9. International Data Transfers
We may process or store data on servers operated by third-party providers located in various jurisdictions. Where required, we rely on:- Standard Contractual Clauses (SCCs),
- adequacy decisions,
- or other lawful mechanisms.