Trust Center Β· Last Updated March 2026

Security is not just
what we build β€”
it's how we operate.

You're trusting us with access to your source code. We take that seriously. This page documents exactly how we handle your data, protect your code, and keep our own platform secure.

Security posture

Our core commitments to every customer

πŸ”

Code Never Stored Permanently

Your source code is analyzed in ephemeral, isolated environments. We retain only the security findings β€” not the code itself. Scan jobs are destroyed after analysis completes.

βœ“ Active Policy
πŸ›‘οΈ

Encrypted in Transit & at Rest

All data in transit uses TLS 1.3. Findings and metadata stored at rest are encrypted using AES-256. Encryption keys are managed via a dedicated key management service.

βœ“ Always Encrypted
πŸ”

Full Audit Logging

Every scan, every finding access, every user action is logged with immutable audit trails. SIEM integration available for teams that need to pull logs into their own systems.

Available on Ultimate
πŸ§ͺ

Penetration Tested

AquilaX undergoes regular third-party penetration testing. We eat our own dog food β€” our own platform runs AquilaX scans on every commit to our codebase.

βœ“ Annual 3rd Party Pentest
🌍

GDPR & UK GDPR Compliant

AquilaX LTD is a UK-registered company. We process data in accordance with UK GDPR and EU GDPR. EU-region SaaS deployment available for data residency requirements.

βœ“ GDPR Aligned
πŸ—οΈ

On-Premises Available

Your most sensitive code never leaves your network. AquilaX on-premises deploys all 32 scanners inside your infrastructure β€” air-gapped environments supported.

Available on Ultimate

How we handle your code

A transparent view of the code scanning lifecycle

1

Repository Access

AquilaX requests read-only access to your repositories via OAuth. We never request write permissions. Tokens are encrypted and stored with rotation policies.

2

Code Fetched

Code is fetched into an isolated, ephemeral container for each scan. The container is network-isolated and destroyed after scanning completes.

3

32 Scanners Run

All 32 scanners analyze the code in parallel within the isolated environment. No code leaves the container during analysis.

4

Findings Stored

Only the security findings (file paths, line numbers, vulnerability descriptions) are stored β€” encrypted. Source code is discarded.

5

Container Destroyed

The ephemeral scan container and all temporary files are cryptographically wiped after each scan. Your code exists in our infrastructure only during the scan window.

What we store vs. what we don't

βœ… What we store (findings only)

  • β€’ File path and line number of findings
  • β€’ Vulnerability type and severity classification
  • β€’ Remediation suggestions
  • β€’ Security Rating scores over time
  • β€’ Scan metadata (timestamp, duration)

❌ What we never store

  • β€’ Your source code
  • β€’ Secrets or credentials found during scanning
  • β€’ PII data identified by scanners
  • β€’ Any plain-text code snippets

AI Safety & Privacy Principles

How Securitron AI handles your code β€” and what it doesn't do

🏒

In-House AI Engines

Securitron AI operates exclusively within AquilaX-owned data centres. Your code is never sent to third-party AI providers (OpenAI, Anthropic, etc.) β€” our AI runs entirely in-house.

🚫

No Third-Party Data Sharing

Customer data is never shared with third parties. We use open-source AI models where licences allow, but internally gathered security intelligence is never shared with any third-party dataset.

πŸ—‘οΈ

Right to Delete

Customers have the right to delete some or all of their information from our systems at any time. Data deletion requests are processed promptly β€” no retention after deletion.

🎯

Cybersecurity-Focused AI

Securitron AI is tailored specifically for the cybersecurity space β€” trained on over 300 million projects to reduce noise and computational demands. Not a general-purpose LLM pointed at code.

⚑

CPU-Efficient by Design

Our AI models are designed to be CPU-friendly, enabling full on-premises installations without GPU infrastructure requirements β€” essential for air-gapped government and defence deployments.

πŸ“–

AI Principles Published

Our full AI and engineering principles are publicly documented at docs.aquilax.ai. Transparency is a non-negotiable principle for us.

Compliance frameworks we help you achieve

AquilaX generates audit-ready evidence packages for the most common frameworks

SOC 2 Type II
Security & Availability
βœ“ Evidence Generation
PCI-DSS v4
Payment Card Security
βœ“ Requirement 6 (AppSec)
HIPAA
Healthcare Data
βœ“ Technical Safeguards
ISO 27001
Information Security
βœ“ Annex A Controls
NIST CSF
Cybersecurity Framework
βœ“ Identify & Protect
OWASP ASVS
AppSec Verification
βœ“ Level 1, 2, 3
CIS Benchmarks
Security Configuration
βœ“ Container & IaC
GDPR / UK GDPR
Data Protection
βœ“ PII Detection

Deployment options for every requirement

πŸ–₯️ On-Premises

On-Premises / Air-Gapped

Deploy the full platform inside your network. Your code never leaves your perimeter.

  • All 32 scanners available on-premises
  • Air-gapped network support
  • Docker / Kubernetes deployment
  • Zero data egress β€” code stays local
  • Single license, no per-seat fees
  • Government & defence approved

Responsible Disclosure

Found a vulnerability in AquilaX?

We believe in working with the security community to keep our platform and customers safe. If you discover a security vulnerability in AquilaX, we ask that you report it responsibly β€” we'll acknowledge receipt within 24 hours and work with you on a coordinated disclosure.

What to include in your report

  • β€’ Affected component or endpoint
  • β€’ Steps to reproduce
  • β€’ Potential impact assessment
  • β€’ Your preferred contact method

Our commitments to you

  • β€’ 24h acknowledgement
  • β€’ 90-day coordinated disclosure timeline
  • β€’ Credit in our security acknowledgements
  • β€’ No legal action for good-faith reports

Report vulnerabilities to: [email protected]

Contact Security Team
Questions About Our Security Posture?

Transparency is a feature,
not an afterthought.

Have specific questions about how AquilaX handles your code? Need a security questionnaire completed? Our team is happy to provide detailed answers.

Talk to Our Security Team β†’ Start Free Scan