Skip to content

Security

adapterOS is designed for sensitive document work in environments where data movement, local access, and reviewer trust matter.

Threat model

Primary attack surfaces

Supply chain integrity, insider risk, local privilege abuse, record deletion, and removable media handling. Offline shifts the problem from network defense to local controls and review discipline.

Mitigations

Model hash verification before use. Policy-bound workflows. Reviewable source trails. Change tracking. No outbound network calls. No telemetry. Explicit, verified updates.

Explore adapterOS

Security contact

Email: [email protected]

Acknowledge within 2 business days. Initial assessment within 5 business days.

On-prem adapterOS has no required external service dependency for sensitive document work. Website dependencies disclosed publicly: Resend (email delivery) and Cloudflare (hosting).