Security
Trust Agent verifies provenance, declared permissions, real runtime behavior, and enterprise fit before a role, skill, or agent is promoted to buyers.
Trust output
Score + risk + badges
MCP extension coverage
+12 MCP checks
Execution posture
Runs on customer infrastructure
Every listing passes through a structured, multi-stage audit pipeline before it reaches buyers.
Intake and source verification
Source provenance, commit history, attribution, manifest schema validation.
Static analysis and dependency audit
Code scanning for unsafe patterns, CVE detection, typosquatting, pinning hygiene.
Prompt safety and permission fidelity
Prompt abuse detection, exfiltration checks, declared vs observed permission alignment.
Runtime sandbox execution
Containerized execution capturing network, file, and process behavior evidence.
Human analyst review and scoring
Expert review, trust score assignment, badge tier, and risk narrative publication.
Source integrity
6 checksProvenance, attribution, commit history, and version drift posture.
Manifest validation
5 checksRequired fields, entrypoints, runtimes, permissions, and supported tools.
Static analysis
8 checksShell misuse, unsafe eval, destructive patterns, obfuscation, and secret access signals.
Dependencies
6 checksKnown CVEs, malicious package heuristics, typosquatting, and pinning hygiene.
Prompt safety
5 checksPrompt abuse, exfiltration instructions, unsafe escalation, and hidden policy bypass.
Permission fidelity
6 checksDeclared versus observed network, file, and process behavior.
Runtime sandbox
7 checksContainerized execution, activity capture, network requests, and file-system behavior.
Behavior verification
4 checksClaim-vs-behavior truthfulness and out-of-scope execution checks.
Trust Agent is designed for GDPR compliance. Primary data is stored in the EU (AWS eu-west-2, London region). We honor all data subject rights including right to access, rectification, and erasure.
Our architecture and operational controls align with SOC 2 Type II trust service criteria. Trust Agent does not currently hold SOC 2 certification but operates to these standards.
Encryption at rest
All data at rest is encrypted using AES-256. Database volumes, backups, and object storage are encrypted by default with managed keys.
Encryption in transit
All traffic is encrypted with TLS 1.3. HSTS is enforced across all endpoints. API traffic, webhooks, and web requests all use HTTPS exclusively.
No message storage
Trust Agent does not store user messages, prompts, or agent conversation content. Audit data captures behavior evidence only - never raw user input.
Creator system prompts and orchestration logic are treated as protected intellectual property. They are never exposed in any API response, audit report, trust badge, or buyer-facing evidence output.
API response isolation
All API endpoints are filtered to exclude system prompt content. Audit reports reference behavior evidence, not raw prompt source.
Seller IP protection
Trust Agent publishes buyer-safe evidence and analyst narratives without exposing raw creator prompts, manifests, or secure role orchestration logic.
Nine-layer audit stack
Source integrity, manifests, static code analysis, dependency hygiene, prompt safety, permission fidelity, runtime sandboxing, behavior verification, and drift handling.
SOC 2-friendly architecture
Role-based access controls, audit exports, wallet trails, protected prompt IP, and company-aware gateway execution. Trust Agent does not claim SOC 2 certification.
Customer-owned execution
Agent logic is packaged, audited, and delivered with protected invocation workflows. Roles and skills execute in the customer environment, not on Trust Agent servers.
Cloud provider
AWS eu-west-2 (London). All primary infrastructure, compute, and storage reside within the EU.
Application hosting
Render managed platform with automated deployments, health checks, and zero-downtime releases.
Database
Neon PostgreSQL with automated backups, point-in-time recovery, and connection pooling. All connections encrypted.
Sandbox evidence
Docker-based jobs capture commands, network requests, and file activity so buyers can see what was actually observed.
Source drift
If indexed source changes after the audit, the verification posture degrades until a new scan and analyst pass complete.
12 additional MCP checks
Endpoint exposure, transport constraints, undeclared tool bridges, external process escalation, and safety envelope validation.
Protected seller IP
Trust Agent publishes buyer-safe evidence and analyst narratives without exposing raw creator prompts, manifests, or secure role orchestration logic.
GDPR
CompliantEU data protection regulation
SOC 2 Type II
AlignedTrust service criteria alignment
OWASP Top 10
AlignedWeb application security standard
ISO 27001
In progressInformation security management
We take security vulnerabilities seriously and appreciate responsible disclosure from the security community. If you discover a vulnerability, please report it to us so we can address it promptly.
How to report
Email security@trust-agent.ai with a description of the vulnerability, steps to reproduce, and any supporting evidence. We aim to acknowledge reports within 48 hours.
Our commitment
Security contact
security@trust-agent.ai