Privacy Protocol

LAST_MODIFIED: 2026-04-26 | ENCRYPTION: ACTIVE

At Sentinel-X Systems, privacy is not a feature; it is the foundational architecture. This protocol outlines how telemetry and operator data are handled within our DevSecOps infrastructure.

1. Zero-Knowledge Reconnaissance

The Sentinel-X Agentic Core executes heuristic network scans purely in memory. Target URLs, payloads, and vulnerability assessments are processed transiently. We employ a strict No-Log policy for network traffic during reconnaissance operations.

2. Operator Identity & Authentication

Authentication is handled via Supabase utilizing stateless JWT (JSON Web Tokens). Passwords are cryptographically hashed using Argon2/Bcrypt before transmission. Sentinel-X does not possess the ability to reverse-engineer operator credentials.

3. AI Copilot Telemetry

Queries submitted to the CypherVault AI Copilot are transmitted securely via TLS 1.3 to the Gemini API Core. We do not store, index, or utilize your specific architectural queries to train external models.