Security posture for Teranode.
What a vendor evaluator (CCO, IT, security review) needs to know before approving Teranode for use inside a regulated firm. This page is the answer to questions that typically arrive in a SIG or CAIQ. The deeper trust posture is at /trust; the policy + sub-processors are below.
Status.
- SOC 2 Type II — in progress. Engagement scoped; auditor selection in progress. Target completion window communicated under NDA.
- No certifications overstated. If a control is implemented but not yet attested, this page says so. If the audit is not yet engaged, this page says so. We do not represent that we hold a certification we have not been issued.
- Penetration test. Pre-seed: not yet engaged. On the post-funding roadmap.
Sub-processors.
Third parties that process customer data in the course of delivering the Council. Each is bound by its own DPA. The full sub-processor list with purpose-of-processing is on /trust.
- OpenRouter — model routing and inference orchestration
- Anthropic, OpenAI, Google, xAI, DeepSeek — frontier model providers (via OpenRouter)
- Vercel — hosting + serverless compute
- Neon — managed Postgres (eval store, opt-in scenarios)
- Groq — voice transcription (whisper-large-v3) on the demo surface
Controls posture.
Controls are aligned to SIG and CAIQ frameworks. Highlights:
- Data minimization. By default no scenario text is persisted server-side. Opt-in capture is required for eval scenarios; explicit consent is recorded on the record.
- No customer data in model training. Every provider relationship is contracted with zero-retention terms (Anthropic, OpenAI, xAI, Google, DeepSeek via OpenRouter; verified via OpenRouter contracted policy).
- Rate limiting at the function. 10 requests per minute per IP on the Council demo surface; 30 per minute on the transcription surface. Cost-DoS defense.
- IP audit projection. API responses are projected to a public schema before return — no internal metadata leaks to the client.
- Authentication. Admin surfaces are gated by HMAC-style signed cookies. Examples surface gated by shared password (single-shared until per-investor tokens ship post-funding).
Incident response.
No security incidents to date. The founder is the on-call contact pre-funding; post-funding the incident response rotation moves to a fractional security engineer or full security hire. Incidents are disclosed to affected parties within 72 hours of detection per GDPR-style timing expectations.
Vulnerability disclosure.
Email security@teranode.aiwith details, reproduction steps, and the impact you observed. We respond within 5 business days. We do not pursue legal action against good-faith security researchers acting under standard responsible-disclosure timelines.
Vendor due-diligence packet.
For RIA, broker-dealer, or family-office vendor reviews, request the standard DD packet (SIG response, sub-processor list, DPA template, sample MSA, security architecture summary): founders@teranode.ai.
For broader trust context (governance, regulatory posture, founder bio), see /trust. For the methodology behind Council quality claims, see /methodology.