How SQUR earns your trust
How SQUR operates safely, validates findings, protects data, and supports compliance. Everything your security team and auditors need before signing.
Security Commitments
Core principles that govern how SQUR's autonomous agents operate on every engagement.
Scoped Testing Only
SQUR operates strictly within authorized targets and scope definitions. Testing never extends beyond what you have explicitly authorized. Out-of-scope assets are automatically excluded.
Rate Limits & Controlled Execution
All automated activity is rate-limited to prevent service disruption. Testing uses non-destructive techniques with configurable throttling. Production environments can specify additional safeguards.
Verified Findings Only
Every reported vulnerability is actively exploited and confirmed by SQUR's AI agents before appearing in your report. If we can't prove it's real, we don't report it.
No DoS, No Data Exfiltration
SQUR never attempts denial-of-service attacks or exfiltrates real data. When exploitation is needed to confirm a finding, it uses synthetic payloads in isolated test conditions.
Full Audit Trail
Every action taken during a pentest is logged with timestamps, reasoning, and evidence. Viewable in your dashboard and included in the final report for complete transparency.
Free Retest Included
After you remediate findings, retest for free to confirm vulnerabilities are resolved. The evidence loop closes - one test price covers the full fix-verify cycle.
Compliance Framework Coverage
SQUR reports are structured to provide evidence supporting the security testing requirements within common compliance frameworks. We provide mapped evidence - we do not claim certification ourselves.
| Framework | Relevant Control | SQUR Evidence Provided | Coverage |
|---|---|---|---|
| ISO 27001:2022 | Annex A 8.8 - Technical vulnerability management | Timestamped pentest report, verified findings, remediation evidence | ✓ Supported |
| SOC 2 Type II | CC7.1 - Logical & physical access controls; CC9.2 - Risk management | Penetration test evidence, vulnerability disclosure, retest confirmation | ✓ Supported |
| DORA (Article 24) | Resilience testing programme including penetration testing | Comprehensive test report, exploited findings list, remediation evidence | ✓ Supported |
| NIS2 | Article 21 - Cybersecurity risk-management measures | Vulnerability assessment, severity ratings, remediation guidance | ✓ Supported |
| GDPR (Article 32) | Technical security measures appropriate to risk | Security testing evidence demonstrating proactive risk management | ✓ Supported |
| CRA (Cyber Resilience Act) | Essential cybersecurity requirements for digital products | API and web application security testing evidence | ~ Partial |
Our Certification Posture
We are actively working toward ISO 27001 and SOC 2 Type II certification. We will publish audit dates once they are committed. In the meantime, our reports are structured to support customers pursuing these frameworks, and the controls below are in active day-to-day operation.
GDPR Article 25 Privacy by Design
Annual External Penetration Test
Data Handling & Privacy
We minimize what we collect, protect what we store, and give you clear data retention controls.
Data Residency
- All customer data stored in EU cloud regions (europe-west1, Belgium)
- No data transferred outside the EU/EEA without explicit consent
- GDPR-compliant data processing agreements available on request
Encryption
- In transit: TLS 1.2+ enforced on all connections
- At rest: AES-256 managed encryption (Google Cloud KMS)
- Credentials and tokens stored separately from report data
Retention & Deletion
- Test data retained for a limited period after test completion
- Reports available for download during retention window
- Data deletion on request
- No sale of customer data to third parties
Access Control
- Role-based access control within customer accounts
- Least-privilege internal access to customer data
- All internal access to production systems logged and audited
- Multi-factor authentication required for all SQUR staff accessing production
Platform Security
SQUR is built and operated with security-by-default. We eat our own cooking.
Secure SDLC
SQUR's own platform is continuously tested using SQUR. Code changes go through automated security analysis, dependency scanning (Snyk, Dependabot), and SAST before deployment.
Infrastructure Security
Hardened container runtime. Network-level segmentation between customer environments. Strict content security policies. No shared compute between customers during active tests.
Vulnerability Management
Critical vulnerabilities patched within 24 hours. High severity within 7 days. Dependency updates on weekly automated schedule. Penetration testing of SQUR infrastructure conducted annually.
Incident Response
Defined incident response process with escalation paths. Customer notification within 72 hours for any data incidents, as required by GDPR Article 33. Post-incident reports available on request.
Service Levels
Our operational commitments on every engagement.
Enterprise SLAs with formal commitments and penalties available on request. Contact sales@squr.ai.
Responsible Disclosure
We welcome good-faith security research and follow a coordinated disclosure process.
Report a Security Issue
Email security@squr.ai with a description of the vulnerability, steps to reproduce, and your assessment of impact. We respond to all reports within 5 business days.
In scope: squr.ai, app.squr.ai, and any
SQUR-operated infrastructure.
Out of scope: Social engineering, physical
attacks, volumetric DoS, and issues in third-party services we
use.
We do not pursue legal action against researchers acting in good faith. We ask that you do not publicly disclose before we have had 90 days to investigate and remediate.
Our /.well-known/security.txt and PGP key will be
published here. In the meantime, email the address above.
Frequently Asked Questions
Trusted by security-conscious teams
Ready to see verified results?
Start your first pentest today. Results in 24 hours, compliance-ready reports, free retest included.