Trust & Security

Move forward with confidence. We offer multiple levels of protection to keep your intellectual property and sensitive data secure.

Product Security

  • Capgo requires all critical third-party vendors to achieve SOC 2 certification at the minimum, and verifies certifications annually.
  • As an open source project, Capgo's code is publicly available on GitHub. The code is continuously audited by: SonarCloud and Snyk , with critical issues blocked from production.
  • SonarCloud: Security RatingVulnerabilities
  • Capgo inherits secure access control and authentication from the Supabase and Cloudflare platforms it is built on.

Data Security

  • All data traffic is encrypted via TLS, leveraging the robust security of the Cloudflare and Supabase platforms.
  • Capgo's open source code is always encrypted in transit via TLS.

Network Security

  • Capgo's code is continuously scanned for vulnerabilities using SonarCloud and Snyk, as an open source project.
  • Capgo's architecture leverages the secure, multi-layered networks of Cloudflare Workers and Supabase.

Application Security

  • Any changes to Capgo's code must first be reviewed and approved by human, SonardCloud and Snyk, adhering to secure coding best practices.
  • Capgo achieves high availability and reliability by building on the Cloudflare Workers and Supabase platforms. Uptime Monitoring.
  • Capgo undergoes yearly penetration testing by reputable third-party security researchers to identify and resolve any vulnerabilities.