Security & Trust
RuneSignal Architecture Trust Document
Last updated: April 2026 · For use in security questionnaires, vendor assessments, and enterprise due diligence.
This document describes the technical security controls implemented in the RuneSignal platform. It is not a penetration test report. A formal pentest programme is planned for Q3 2026 via a HackerOne managed engagement.
1. Cryptographic Signing — Ed25519
Every event written to the RuneSignal audit ledger is signed with an Ed25519 private key before persistence. Ed25519 (RFC 8032) provides 128-bit security with deterministic signatures — suitable for court-admissible audit trails and regulator-presentable evidence packages.
tenant_id + agent_id + event_type + timestamp + data_hash — the concatenated canonical string is signed before insert.GET /api/v1/verify/pubkey. Any party can independently verify a signature without contacting RuneSignal.audit_events table. The RLS policy enforces this at the Postgres level regardless of application code.ENABLE_PQC feature flag. Not marketed until fully implemented and independently audited.2. Tenant Data Isolation — Row-Level Security
RuneSignal is a multi-tenant SaaS. Every database table that stores customer data includes a tenant_id foreign key referencing the tenants table. Isolation is enforced at the Postgres RLS layer — not only in application code.
tenant_id at the edge and injects it as an X-Tenant-Id header. All downstream queries are scoped to that tenant ID.supabase/migrations/ in the public GitHub repository.3. Authentication — MFA AAL2 Enforcement
All RuneSignal dashboard access requires a valid Supabase session. If a user has enrolled a TOTP factor, the platform enforces Authenticator Assurance Level 2 (AAL2) before any dashboard route is accessible.
supabase.auth.mfa.getAuthenticatorAssuranceLevel() on every request. If nextLevel === 'aal2' and currentLevel !== 'aal2', the user is redirected to the MFA challenge page — regardless of session validity.tl_* prefix). Keys are stored as SHA-256 hashes. The plaintext key is shown exactly once at generation time.@supabase/ssr. No tokens stored in localStorage.4. Encryption — At Rest and In Transit
All customer data is encrypted both at rest and in transit. RuneSignal does not operate its own database infrastructure — storage is delegated to Supabase (Postgres on AWS), which provides managed encryption.
.env* files are in .gitignore.5. Rate Limiting and API Abuse Prevention
RuneSignal applies rate limiting at the edge (middleware layer) before any request reaches application code or the database.
/api/cron/*) require a Bearer token matching the CRON_SECRET environment variable. Unauthenticated requests return HTTP 401.X-RateLimit-Limit, X-RateLimit-Remaining, and X-RateLimit-Reset headers for client-side backoff implementation.6. Vulnerability Management
RuneSignal follows a structured approach to identifying and remediating security vulnerabilities.
npm dependencies. Critical and high severity issues targeted for resolution within 7 days./api/v1/* endpoints and the dashboard application.7. Infrastructure and Supply Chain
RuneSignal is built on a minimal, auditable supply chain of established cloud infrastructure providers.
main and dev. All changes require pull request review.8. Regulatory Compliance Posture
| Framework | Status | Notes |
|---|---|---|
| GDPR | Implemented | DPA available. RLS, encryption, deletion rights, breach notification in place. |
| EU AI Act (Articles 13, 14, 17, 26) | Core capability | Evidence export endpoint generates article-mapped compliance packages. |
| ISO 42001 | Partial | Clause 9 evidence mapping in progress. Full certification not yet pursued. |
| SOC 2 Type I | Planned Q3 2026 | Observation period begins Q2 2026. Required for US enterprise buyers. |
| SOC 2 Type II | Roadmap | 12-month observation required after Type I. |
| ISO 27001 | Roadmap | Post Series A priority. |
| HIPAA | Roadmap | Available on Enterprise tier with BAA. Timeline subject to customer demand. |
Security enquiries: security@runesignal.ai · Data Processing Agreement · Service Level Agreement
RuneSignal Architecture Trust Document · April 2026 · This document is provided for informational purposes only and does not constitute a warranty or guarantee of security. Controls are subject to change with notice.