38 controls. 4 open findings. Score 87%. All live, all signed, all here.
Our public threat model - what we protect, what we don't, and the risks we acknowledge
Exactly what's encrypted, what's not, which algorithms, and where the limits are - nothing hidden
Found a vulnerability? Here's our policy, channels, and response times
Software Bill of Materials - every dependency, version, and license our system uses
We run Capsule on ourselves - live. See the results in real time
What we publish ourselves - can't be exposed against us. We publish our threat model, our own scan results, and our algorithms.
AES-256-GCM, RSA-OAEP, PBKDF2, scrypt - open, recognized standards. No "proprietary magic". Security through obscurity is not security.
We're not perfect, and we say it out loud. Our threat model includes what we don't protect. 38 controls - not 1,000. SOC-ready - not SOC-certified.
Capsule runs on Capsule itself - 24/7. If our scanner finds an issue on us, we fix it and publish.
Found something? Report here — we respond within 24 hours.