8 sprints, 69 tasks, 39 modules. SOC2, ISO 27001, DPDPA compliance — not bolted on, architected from day one.
A systematic security campaign executed across 8 focused sprints, each targeting a distinct compliance domain.
Not checkbox security. Every framework maps to live controls with evidence collectors and automated assessments.
Access control with RBAC and JWT validation. Immutable audit logging with cryptographic integrity chains. Encryption at rest and in transit for all sensitive data.
Modular control catalog with 140 security controls mapped to Annex A. 5 automated evidence collectors generate audit-ready artifacts on demand.
India-specific compliance: consent management with granular purpose tracking, data subject rights automation, PIA templates, and CERT-In 6-hour breach reporting.
Eight domains, each with purpose-built Rust modules. Not wrappers. Not configs. Real security infrastructure.
A single NULL column or missing aggregate must never bring down the WebSocket server. Defense in depth at every layer.
Every gateway handler follows four hard rules: safe row access with try_get(), explicit SQL casts on aggregates, Result-based error propagation, and sanitized client-facing errors.
The gateway standard (GOLDEN-030) mandates integration tests covering empty tables, NULL values, and valid data for every handler.
row.get() calls replaced with safe alternatives
::int8 / ::float8 casts
catch_unwind safety net at the dispatch level
// Crashes the entire gateway let avg: f64 = row.get("avg_score"); let total = COUNT(*); // NUMERIC type
// Returns 0.0 on NULL let avg: f64 = row.try_get("avg_score") .unwrap_or_default(); COALESCE(AVG(score),0)::float8
Every change passes through spec review, automated batch verification, and deployment gates before reaching production.
Feature specifications validated against security requirements before implementation begins. Task descriptions include threat model references.
Inter-batch verification runs cargo check, flutter analyze, and security linting after every agent wave. Build commands banned from individual tasks.
SAST scanning, dependency audit, container scanning, and test campaign pass/fail gate run before any deployment to sandbox or production.
Every vulnerability discovered during the security campaign was resolved before deployment. Here are six of the most critical.
CSP headers added across all routes. Input sanitization enforced at the gateway layer with strict content-type validation.
FIXEDLog redaction pipeline intercepts all structured output. Secret masking with regex patterns across 26 known secret formats.
FIXEDParameterized queries enforced across all 370 gateway handlers. Zero string interpolation in SQL. Compile-time query validation via sqlx.
FIXEDJWT rotation on every login event. Session invalidation on password change. Token expiry enforced with server-side validation.
FIXEDStrict origin whitelist with per-product configuration. Preflight validation on all non-simple requests. Wildcard origins banned.
FIXEDAPI key rotation policy enforced at 90 days. Automated alerts 14 days before expiry. Revoked keys immediately invalidated.
FIXEDEvery AI agent runs through a multi-gate verification pipeline. Agents propose, humans approve.
Every agent dispatch tracked end-to-end: input hash, execution trace, output hash, verification result. 1,266 context transactions logged with cryptographic integrity.
500-token soft limit per persistent context injection. Automatic trimming when threshold exceeded. No unbounded AI calls — every interaction budgeted and tracked.
Build commands, sleep-poll loops, and oversized tasks auto-blocked before dispatch. 8 regex patterns enforce zero tolerance at the orchestrator level. Violations never reach an agent.
Spec review, deploy approval, and quality score above 60 required before any production change. Agents propose, humans approve. No autonomous deployment.
A continuous investment in hardening, auditing, and certifying the platform.
No cloud lock-in. No telemetry. DevPilot runs entirely on your infrastructure.
24MB Rust binary. No cloud dependency. No container runtime required. Runs on your infrastructure with zero external calls.
Every state change logged permanently. Cryptographic integrity chain prevents tampering. Full history preserved — no deletions, no overwrites.
AES-256 for sensitive fields. Argon2id for password hashing. JWT with HS256 for session tokens. Industry-standard cryptographic primitives throughout.
Every product built with DevPilot inherits enterprise-grade security infrastructure. No extra configuration. No bolt-on modules.