Trust

Security posture for Code Constitution™. Every claim below ties to a checkable property of the system or a documented attestation state. No unsubstantiated certifications, no aspirational language.

Credentials handling

  • Vault pattern: customer cloud-provider tokens stay in the customer's GitHub Secrets — the reusable workflow runs in the customer's runner
  • We never see HuggingFace / Cloudflare / AWS / GCP / Azure tokens
  • GitHub App installation tokens are minted just-in-time per request; cached in memory ≤ 50 minutes

Service-to-service auth

  • OIDC-only between customer runner and our worker (no shared secrets)
  • Tokens verified against the public GitHub JWKS, cross-checked against the calling repo + workflow
  • Webhook signatures verified via Web Crypto HMAC-SHA256 with 5-minute skew window and constant-time compare

Audit chain

  • Every state-changing decision chain-hashed (this_hash = sha256(prev_hash || canonical_json(event)))
  • Append-only by construction; mutations are blocked at the storage layer (Cerbos audit_trail.yaml denies UPDATE/DELETE)
  • Replay engine reconstructs platform state at any prior timestamp from the chain

Determinism

  • Engines are pure functions over the file content + dictionary + rule pack — same input → same output
  • No LLM in the check-execution path; LLM-assist (fix-PR composer) is opt-in + BYO key

Attestation status

Qualified status only. We never claim a certification we don't hold; in-progress audits are flagged with the target window.

FrameworkStatus
SOC 2 Type IIAudit in progress (target Q4 2026)
ISO 27001:2022Controls mapped; Stage 1 audit Q4 2026
ISO 42001:2023 (AIMS)Internal AIMS in place; external audit Q1 2027
GDPR Art. 32Implemented; DPO designated
EU AI ActSelf-classified non-high-risk; Art. 50 transparency obligations met

Sub-processors

The minimal list of vendors with access to operational data in service of Code Constitution™. Material changes are announced 30 days in advance via the trust-center change log.

VendorPurposeRegion
CloudflareEdge / Pages / Workers / R2 / D1 / Email RoutingGlobal edge + EU/US primaries
GitHubRepository hosting + Actions + OIDC issuer + Check Runs APIGlobal
SLA →

Per-tier uptime + response targets.

Incidents →

Public incident timeline + post-mortems.

Status →

Live probe of every surface.