Privacy Protocol
LAST_MODIFIED: 2026-04-26 | ENCRYPTION: ACTIVEAt Sentinel-X Systems, privacy is not a feature; it is the foundational architecture. This protocol outlines how telemetry and operator data are handled within our DevSecOps infrastructure.
1. Zero-Knowledge Reconnaissance
The Sentinel-X Agentic Core executes heuristic network scans purely in memory. Target URLs, payloads, and vulnerability assessments are processed transiently. We employ a strict No-Log policy for network traffic during reconnaissance operations.
2. Operator Identity & Authentication
Authentication is handled via Supabase utilizing stateless JWT (JSON Web Tokens). Passwords are cryptographically hashed using Argon2/Bcrypt before transmission. Sentinel-X does not possess the ability to reverse-engineer operator credentials.
3. AI Copilot Telemetry
Queries submitted to the CypherVault AI Copilot are transmitted securely via TLS 1.3 to the Gemini API Core. We do not store, index, or utilize your specific architectural queries to train external models.