Aller au contenu principal
trust center

Security, compliance, immutable refusals.
Everything is public.

No hidden argument, no closed brochure. Anything that can be reviewed is reviewable. Anything that can be proven is GPG-signed. The four refusals are encoded in the source.

compliance per tier

Regulatory frameworks covered

FrameworkPilotBootOperateAugmentSovereign
GDPR
DPA art. 28
ISO 27001 readiness
ISO 27001 certified
NIS2
DORAmodule
CSRD reporting
SecNumCloud
HDSmodule
ITAR / dual-use
GPG-signed reasoning trail
Air-gap
Codebase reviewed by external party
the four red lines

What the exocortex will always refuse

  • KYC

    No action under the client's identity. KYC remains the personal commitment of the executive.

    exior/governance/redlines.py:KYC

  • Payment action

    No payment, transfer or direct debit initiated without a validated human signature.

    exior/governance/redlines.py:PAYMENT_ACTION

  • First-touch editorial

    No outbound communication on behalf of the client without explicit prior validation.

    exior/governance/redlines.py:FIRST_TOUCH_EDITORIAL

  • Irreversible external destruction

    No deletion, overwrite or unpublishing of an external asset that cannot be recovered.

    exior/governance/redlines.py:IRREVERSIBLE_EXTERNAL_DESTRUCTION

documentation

Public technical security

security entry point

Responsible disclosure

Found a vulnerability? Report via security@exior.co. Private bug-bounty programme for verified researchers. Initial response within 48 hours. Critical patch within 7 days. Public disclosure coordinated after remediation.