Skip to main content
Platform Integrity

Trust is architectural.

OmniSentient is built on the principle that trust must be enforced in code, not in policy. Every guarantee below is system-verified — observable in the audit ledger, blockable at the API layer, structurally impossible to bypass.

Live Enforcement Console

Current security posture

Each signal below is verified at runtime. Status is computed from the platform's own audit ledger — not self-attested.

Server-Authoritative RBAC

All mutative operations (POST, PATCH, DELETE, PUT) are blocked at the API layer for viewer-role users. Role resolved from verified JWT claims only — never from request bodies.

Enforced
Org-Scoped Data Isolation

Every database query is scoped by org_id at the query layer. Supabase Row Level Security (RLS) enforces the same boundary at the DB level — defense in depth.

Enforced
Immutable Audit Ledger

All system events are written to an append-only audit table. Entries include UTC timestamp, actor identity, correlation ID, and module origin. No edits, no soft-deletes.

Enforced
JWT Identity Verification

All authenticated sessions use HMAC-signed JWTs with expiry enforcement. Tokens stored in httpOnly cookies — never in localStorage.

Active
CSRF Protection

Double-submit cookie CSRF tokens on all state-mutating endpoints. SameSite=Lax cookie policy as a secondary defense layer.

Audited
Data Handling

What we read, what we don't.

What OmniSentient reads

Dependency manifests (package.json, requirements.txt, go.mod, pom.xml). Workflow run logs. Webhook event metadata.

What OmniSentient never reads

Application source code outside identified vulnerability paths. Secrets, credentials, environment variables. Private repository content beyond the minimum required for the scan.

What OmniSentient never writes

No force-pushes, no direct commits, no merges. All remediation requires a Pull Request and a human approval gate. Zero-write principle.

Incident Response

How we respond.

Security vulnerability disclosure

Report security issues to security@omnisentient.ai. We acknowledge within 24 hours and publish a CVE if warranted.

Platform incident protocol

All platform-level incidents create a ledger entry with UTC timestamp and actor identity. Status updates published at /status.

Data breach response

Affected organizations are notified within 72 hours of confirmed breach. Forensic audit exports available on request for compliance filings.

Forensic Guarantees

Structural properties of the audit ledger.

These are not policies that can be toggled off. They are how the ledger is built.

NON_REPUDIATION

Actor Attribution

Every entry records the verified GitHub identity of the actor. Anonymous writes are blocked at the database constraint level.

TEMPORAL_INTEGRITY

UTC Timestamps

Stored and rendered in UTC. Relative time tokens ("4m ago") are computed at render time from the source UTC value — never stored as relative.

CORRELATION_INTEGRITY

Correlation IDs

Every incident, audit event, and system action carries a correlation_id linking it to its causal chain. Investigation is graph traversal, not text search.

Want to review the architecture?

The architecture page documents the full system stack, data flow, and security principles.