// SECURITY_PROTOCOL_VERSION_2.1

Total Data
Sovereignty.

Infrastructure security shouldn't require compromising your architecture secrets. Cloud Auditor is designed to never see your data.

Zero Outbound Metadata

Most SaaS scanners require 'Write' access or Metadata sync. Cloud Auditor makes 100% of its SDK calls from your hardware. No infrastructure map is ever sent to our servers.

Read-Only Enforcement

The engine is programmatically constrained to read-only API actions. It is impossible for the CLI to modify, delete, or create AWS resources by design.

RSA-4096 Signing

Every binary release is cryptographically signed. We provide checksums and signing identities to ensure the code running on your machine matches our source exactly.

Local Engine Execution

We don't use Lambda. We don't use Containers. We use a Go-native engine that runs as a single static binary on your host machine, ensuring total control over the execution environment.

Technical Architecture

Data Flow Topology

STAGE_01

YOUR_HOST

CLI Binary + Local AWS Credentials

Analytics Only
STAGE_02

AWS_API

Encrypted SDK Traffic (TLS 1.2+)

NOTE: The only communication with our servers is a single HTTPS request to validate your beta license key. No AWS metadata is passed in this request.