Trust Center

Security overview

SupraOS is designed for governed execution, not unconstrained automation.

Security review quick answersSecurity contact

Overview

SupraOS is designed for governed execution, not unconstrained automation. Our security posture is centered on the same principles that shape the product itself: least privilege, policy gating, clear attribution, controlled execution, and verifiable records.

Core design principles

Least-privilege by design

SupraOS is designed so access and actions can be limited to the minimum needed for the workflow and the role involved.

Policy before action

Higher-risk actions are intended to be subject to policy checks, approvals, and explicit governance conditions before they are executed.

Clear attribution

Actions, approvals, and outcomes are intended to be attributable to the relevant identity and execution context.

Data minimization

SupraOS is designed to keep source-of-truth data in existing customer systems where appropriate and store the minimum structured work state and proof artifacts needed to operate workflows and produce receipts.

Controlled disclosure

SupraOS is designed to support proving that work happened without exposing more content than necessary.

Publicly stated controls

  • Role-based access controls are part of the product architecture.
  • Deployment options are designed to include cloud, private cloud, or hybrid patterns.
  • Data residency and retention are intended to be configurable by customer requirements.
  • Customer data is not used to train shared models by default.

What we do not overclaim

  • We do not claim a certification that has not been completed.
  • We do not claim every integration or deployment pattern is available in every environment by default.
  • We do not claim universal autonomy without policy, approval, and controlled execution constraints.
Reviewer notes
Public-safe claims only
This page intentionally avoids certification or deployment claims that have not been formally completed.
Operational principle
Policy, approvals, and proof come before high-risk actions.
Follow-up path
Qualified evaluators can request deeper diligence materials during engagement.
Last updated: March 3, 2026