Move forward with confidence. We offer multiple levels of protection to keep your intellectual property and sensitive data secure.
Product Security
Capgo requires all critical third-party vendors to achieve SOC 2 certification at the minimum, and verifies certifications annually.
As an open source project, Capgo's code is publicly available on GitHub. The code is continuously audited by: SonarCloud and Snyk , with critical issues blocked from production.
SonarCloud:
Capgo inherits secure access control and authentication from the Supabase and Cloudflare platforms it is built on.
Data Security
All data traffic is encrypted via TLS, leveraging the robust security of the Cloudflare and Supabase platforms.
Capgo's open source code is always encrypted in transit via TLS.
Network Security
Capgo's code is continuously scanned for vulnerabilities using SonarCloud and Snyk, as an open source project.
Capgo's architecture leverages the secure, multi-layered networks of Cloudflare Workers and Supabase.
Application Security
Any changes to Capgo's code must first be reviewed and approved by human, SonardCloud and Snyk, adhering to secure coding best practices.
Capgo achieves high availability and reliability by building on the Cloudflare Workers and Supabase platforms. Uptime Monitoring.
Capgo undergoes yearly penetration testing by reputable third-party security researchers to identify and resolve any vulnerabilities.