This page describes the public security posture of Stage0 as a hosted API. It covers what data reaches Stage0, how decisions are traced, and what buyers should verify before treating it as a production control layer.
This page does not claim a certification status (SOC 2, ISO 27001, etc.). If your procurement process requires a formal certification, contact us to discuss the current posture and roadmap.
The `/check` endpoint receives the fields you choose to send: goal, tools, constraints, side_effects, environment, and optional context fields. Stage0 does not require PII. Avoid sending credentials, user data, or secret values in check payloads.
Each request is authenticated with an API key bound to your account. Keys are hashed at rest and never returned in full after creation.
Standard HTTP metadata: IP address, timestamp, user agent. These are used for rate limiting and abuse detection.
Stage0 does not receive the output of agent actions, database contents, file contents, or downstream execution results. It only sees the proposed action before it runs.
Every `/check` response includes fields that let you carry the decision into your own audit trail. Stage0 does not provide a hosted audit log UI — you are expected to store these fields in your own system.
Stage0 retains request logs for a limited window for operational purposes (debugging, rate limiting, abuse detection). Logs are not exposed to other customers. If you require a specific retention period or data deletion SLA, contact us before production rollout.
If Stage0 is unavailable, returns an unexpected status code, or times out, your runtime must treat the missing decision as a denial and stop the side effect. This is the enforced contract: a missing authorization is not an implicit allow. Your integration is responsible for implementing fail-closed behavior server-side.
Stage0 is a hosted SaaS API. There is currently no self-hosted or on-premises deployment option. If data residency or network isolation is a hard requirement, contact us to discuss.
All API traffic is over TLS. Unencrypted HTTP requests are rejected.
API keys are scoped to individual accounts. A key from one account cannot access data or decisions from another account.
Stage0 does not execute tasks, call external tools, or trigger downstream actions on your behalf. It returns a decision and stops.
Before treating Stage0 as a production control layer, confirm each of the following:
If your procurement process requires a security questionnaire, architecture review, or a conversation about data handling, contact us before rollout. Include your runtime shape, risk surface, and any specific compliance requirements.