TRUST // SECURITY

Security by architecture,
not policy.

VEKTOR's local-first design eliminates the most common attack surface entirely: the cloud. Your agent memories never transit a network you don't control.

AES-256-GCM Encryption
Zero Cloud Storage
Local SQLite · No egress
SOC 2 Type I — In Preparation
TLS 1.2+ in transit
01 Architecture — The local-first threat model
// Data flow — where your memories actually live
Memory storage
SQLite database on your own machine or server. No Vektor cloud. No S3 bucket. No shared tenancy. The file is yours.
Embeddings
Computed locally via ONNX Runtime using bge-small-en-v1.5 (384 dims). The model runs in-process. Your text never leaves to an embedding API by default.
Credential vault
API keys stored in ~/.vektor/vault.enc — AES-256-GCM encrypted, machine-bound to your OS identity. No plaintext credentials on disk.
LLM provider calls
Outbound only, to the provider you choose. VEKTOR acts as a local router — memory context is injected at the SDK layer before your prompt leaves the machine. We never proxy LLM requests.
Licence validation
Single outbound call to verify your key on first activation. After that, validation is local. The check contains no memory data.
No shared infrastructure
Every VEKTOR installation is isolated. There is no multi-tenant database, no shared memory pool, no Vektor-operated service that holds customer data. A breach at Vektor cannot expose your memories.
Zero data egress by default
VEKTOR does not send telemetry, usage statistics, or memory content anywhere. The only outbound network calls are the ones you initiate — to your chosen LLM provider and licence validation.
Encrypted credential vault
All API keys stored via cloak_passport — AES-256-GCM with OS-bound key derivation. The vault is unreadable on any machine other than the one it was created on.
02 Compliance Controls — SOC 2 Trust Service Criteria

The following table maps the five Trust Service Criteria to concrete controls implemented or in progress. We are currently preparing for SOC 2 Type I audit.

ControlTSCDescriptionStatus
CC1.1Control EnvironmentSecurity policy documented, ownership assigned, annual review cycle establishedImplemented
CC1.2Control EnvironmentVendor and third-party risk assessments documented for all external dependencies (npm packages, LLM providers)In Progress
CC6.1Logical AccessSSH key-only authentication to production VPS. Password auth disabled. Key stored in encrypted vault.Implemented
CC6.2Logical AccessAccess review log — record of who has production access, when granted, when last reviewedImplemented
CC6.3Logical AccessOffboarding procedure — key revocation and access termination process documentedImplemented
CC6.6Logical AccessAll data at rest encrypted (AES-256-GCM). All data in transit encrypted (TLS 1.2+). Encryption policy written and signed.Implemented
CC7.1System OperationsDependency vulnerability scanning — npm audit runs on every deployment. High/critical findings block deploy.Implemented
CC7.2System OperationsAutomated timestamped backups before every production deployment. Rollback capability tested and documented.Implemented
CC7.3System OperationsIncident response runbook — detection, classification, containment, notification, and post-mortem processImplemented
CC7.4System OperationsStructured audit log of all production SSH sessions, deployments, and configuration changesImplemented
CC8.1Change ManagementAll production changes reviewed before deployment. Backup-before-deploy enforced via tooling. Rollback tested.Implemented
CC9.1Risk MitigationRisk register — identified risks, likelihood/impact ratings, mitigations, and review scheduleImplemented
CC9.2Risk MitigationBusiness continuity plan — data recovery, service restoration, and communication proceduresIn Progress
A1.1AvailabilityUptime monitoring with automated alerting. SLA commitments documented in Terms of Service.In Progress
PI1.1Processing IntegrityMAGMA memory pipeline integrity — causal, temporal, and entity graph consistency verified on every write cycleImplemented
C1.1ConfidentialityNo customer memory data processed or stored on Vektor infrastructure. Confidentiality by architecture.Implemented
P1.1PrivacyPrivacy notice published. Data handling practices documented. No personal data collected beyond licence email.Implemented
03 Encryption at rest and in transit
At rest — AES-256-GCM
The credential vault (vault.enc) uses AES-256-GCM with a machine-derived key. The SQLite memory database is stored on-device. Users may layer full-disk encryption (BitLocker, FileVault, LUKS) for additional protection — VEKTOR does not prevent or interfere with this.
In transit — TLS 1.2+
All outbound HTTPS connections enforce TLS 1.2 minimum. VEKTOR uses Node.js's built-in TLS stack. Connections to LLM providers (OpenAI, Anthropic, Groq etc.) inherit those providers' TLS policies, all of which are TLS 1.2+. Licence validation calls are HTTPS only — no fallback to HTTP.
04 Dependency management and patching
// Patch policy
Vulnerability scan
npm audit --audit-level=high runs on every production deployment. High or critical findings block the deploy until remediated.
Patch SLA
Critical CVEs patched within 7 days of public disclosure. High severity within 30 days. Medium within the next planned release cycle.
Dependency pinning
Production package-lock.json committed and verified on install. No floating version ranges in production code.
Key dependencies
better-sqlite3 (local DB), onnxruntime-node (local embeddings), camoufox (browser layer). All audited on every release. No proprietary binaries with external callbacks.
05 Incident response
Responsible disclosure

If you discover a security vulnerability in VEKTOR Memory or the Slipstream SDK, please report it to [email protected]. We ask that you give us 90 days to remediate before public disclosure.

We will acknowledge your report within 48 hours, provide an initial assessment within 7 days, and keep you updated on remediation progress. We don't currently offer a formal bug bounty, but we recognise researchers who report valid findings in our release notes.

Incident classification

P0 — Critical: Active exploitation, credential exposure, or data breach. Response begins within 1 hour. All production access locked down immediately.

P1 — High: Unpatched high-severity CVE in a shipped dependency, or authentication bypass. Response within 24 hours.

P2 — Medium: Confirmed vulnerability without known exploit. Patched in next planned release within 30 days.

P3 — Low: Informational findings, hardening opportunities. Addressed in quarterly review cycle.

What a breach at Vektor means for you

Because VEKTOR is local-first with zero cloud memory storage, a compromise of Vektor's own infrastructure cannot expose your memory corpus. The worst case for a Vektor server breach is: exposure of your licence email address and activation timestamp. That's the only data we hold.

Your memories, embeddings, and agent context live entirely on your own infrastructure. They are not reachable from ours.

Notification policy

In the event of a confirmed security incident affecting customer data (i.e., licence account information), we will notify affected customers via their registered email within 72 hours of confirmation, consistent with GDPR Article 33 timelines even where not legally required.

Notifications will include: nature of the incident, data categories affected, steps we've taken, and recommended actions for customers.

06 Data we hold — complete inventory
// Complete inventory of data held by Vektor
Licence email
The email address used at purchase. Required for licence management and security notifications. Stored in our Polar.sh billing system.
Activation timestamp
When your licence key was first activated. Used to detect abuse. Contains no device fingerprint or IP address.
Payment data
Processed entirely by Polar.sh (Stripe-powered). We never see or store card numbers. PCI-DSS compliance is Polar's responsibility.
Memory content
None. Zero. Your agent memories are stored locally and never transmitted to Vektor servers.
Telemetry / analytics
None collected. The SDK contains no analytics calls, no error reporting to Vektor, and no usage metrics phoning home.

Full details in our Privacy Policy.

07 Security FAQ
Can Vektor read my agent memories?

No. Your memories are stored in a SQLite database on your machine or server. Vektor has no network path to that database. We physically cannot read your memories — not by policy, but by architecture.

What happens if I cancel my subscription?

Your memories remain on your machine and are fully accessible without an active licence — the local SQLite database doesn't have a kill switch. You retain ownership of your data regardless of subscription status. The only thing that stops working is the licence validation, which disables the SDK's LLM routing features.

Is VEKTOR GDPR compliant?

For the data we hold (licence email, activation timestamp): yes. We process this data on the legal basis of contract performance. You can request deletion at any time by emailing [email protected] — we will purge your licence record within 30 days, after which your licence key will cease to function.

For your agent memories: GDPR doesn't apply to data we never see. That data is entirely under your control and jurisdiction.

Does VEKTOR work in air-gapped environments?

Partially. The memory layer, embedding computation, and MAGMA graph operations work fully offline. Licence activation requires a one-time internet connection. After initial activation, offline operation is supported for the memory functions. LLM provider calls obviously require connectivity to your provider, but that's outside VEKTOR's scope.

Do you have a SOC 2 report?

We are currently preparing for SOC 2 Type I. We expect to complete the audit in Q3 2026, with Type II observation beginning immediately after. In the meantime, our local-first architecture provides stronger practical security guarantees than a SOC 2 badge on a cloud product — there is no centralised Vektor data store to audit in the first place.

If you have an enterprise procurement requirement for SOC 2 today, contact [email protected] — we can share our in-progress controls documentation and security architecture detail under NDA.

What's your password and secrets policy?

Production access is key-only SSH — no passwords. All API keys and credentials are stored in the cloak_passport encrypted vault, never in plaintext config files or environment files committed to source control. Internal systems use unique credentials per service with no shared passwords.

Security questions? Talk to us.

Enterprise procurement, NDA security reviews, architecture deep-dives — we're happy to go into detail. Or just read the code.

View on GitHub Contact Security