Legal

Security & Trust

How Aletheia Core protects your data and operations

Architecture

Aletheia Core uses a tri-agent pipeline to evaluate every API request before execution:

All three agents must independently pass for a request to proceed. Any single agent can deny. The system fails closed for high-risk actions when critical controls are unavailable (for example: rate limiter, decision store, manifest verification, or semantic engine degradation). Availability exceptions are surfaced as explicit denied/degraded responses in the API and demo paths. Audit chain continuity is guaranteed within a single instance; multi-replica chain coordination is planned for a future release.

Data Protection

Access Controls

Audit Trail

Every security decision is logged with a cryptographic receipt containing:

Receipt signing migrated from HMAC-SHA256 to Ed25519 (asymmetric) on 2026-05-03. Receipts issued after that date are signed with our Ed25519 receipt-signing key and can be verified by any third party using the public key at /.well-known/aletheia-receipt-key.pem. Receipts issued before that date were signed with HMAC-SHA256 and remain verifiable for the audit retention period.

Receipts can be independently verified using the Receipt Viewer. Audit logs are exportable in JSONL format from your dashboard.

Incident Response

Vulnerability Reporting

Report security vulnerabilities by emailing info@aletheia-core.com. Please do not disclose vulnerabilities publicly before a fix is available. For full details, see our Security Policy.

Infrastructure

Compliance Posture

We are working toward formal SOC 2 Type II and ISO 27001 certification. Contact us for details on our timeline.

Contact

Security questions or concerns: info@aletheia-core.com