SECURITY
Our team previously ran security programs at companies like Google and Chainguard. We get it.
Our Security Principles
Hardware-backed cryptographic identity and encryption are our security perimeter
Every layer fails—we rely on overlapping controls (swiss cheese model)
All secrets leak eventually. We prefer OIDC and runtime KMS
Less data = less risk. Metadata cache only (21-day TTL), 0 persistent user data
Most services have 0-1 external deps. We use ko+Chainguard
We never sell your data. Third-party sharing limited to operational requirements
Compliance & Policies
We're engineering our security controls to meet SOC 2 standards from day one.
Vulnerability Disclosure
Found a security issue? Check out our security.txt for reporting instructions.
We take all reports seriously and will respond promptly.
Want to discuss security?
We could talk all day about security architecture, compliance, or threat modeling.