Konvu is a RSAC Launch Pad finalist 🎉Meet the founders in SF →

    Security

    How Konvu protects your data

    Konvu never stores your code. Two deployment models let you choose exactly what data leaves your environment and what never does.

    SOC 2 Type II certified

    Independently audited by Johanson Group. Full report available via our Trust Center.

    Self-hosted option

    Our K8s controller runs in your environment. Konvu never has access to your code.

    Zero LLM data retention

    Contractual zero-retention agreements with all LLM providers. No training on your data.

    Annual external pentests

    Independent third-party penetration testing of our infrastructure and application.

    Choose your deployment model

    Both models minimize data exposure by design. The difference is where code analysis runs.

    Recommended for regulated industries

    Self-hosted analysis

    Self-hosted deployment architecture: Konvu K8s controller runs inside customer environment, only metadata leaves
    • Konvu K8s controller runs inside your environment
    • Connects to your GitHub/GitLab and scanners within your network
    • Konvu never has access to your code
    • Bring your own LLM API key if you have an enterprise agreement
    • Only metadata (decisions, evidence) flows to Konvu cloud
    Only code snippets shared with LLM. No training. No retention.
    Fastest to deploy

    Cloud analysis

    Cloud deployment architecture: code fetched for ephemeral analysis in Konvu AWS environment, then discarded
    • Code fetched into Konvu's AWS environment for analysis
    • Ephemeral: code analyzed then discarded. Nothing stored.
    • Code snippets sent to LLM for exploitability analysis
    • Only metadata (decisions, evidence) persisted in Konvu
    Code fetched, analysed, discarded. Nothing stored.

    What happens to your data

    A concrete accounting of every data type, where it goes, and how long it lives.

    Data typeSelf-hostedCloud analysisRetention
    Source codeStays in your environment. Konvu never has access.Fetched for ephemeral analysis, then discardedNone
    Code snippets (sent to LLM)Sent from your environment to LLMSent from Konvu environment to LLMZero. Contractual no-retention
    Scanner findingsProcessed in your environmentProcessed in Konvu environmentRetained for ongoing triage
    Triage decisions & evidenceStored in KonvuStored in KonvuRetained for audit trail
    PII / end-user dataNever accessedNever accessedN/A
    AI security

    How we use LLMs responsibly

    Zero data retention

    Contractual agreements with all LLM providers. Your data is not used for training, fine-tuning, or model improvement.

    Minimal context window

    Only the specific code snippet relevant to a finding is sent for analysis, not your full codebase.

    Customer-managed keys

    In self-hosted mode, if you have an enterprise agreement with an LLM provider, you can use your own API keys.

    Multiple provider support

    Our architecture supports multiple LLM providers. We select the best model for each analysis task.

    Infrastructure and compliance

    For the full picture, visit our Trust Center to access our SOC 2 report, pre-filled questionnaires, and policies.

    SOC 2 Type II

    Audited by Johanson Group. Report available through our Trust Center.

    AWS infrastructure

    Production workloads run on AWS.

    GDPR compliant

    Data Processing Addendum available. Subprocessor list maintained. EU data subject rights supported. See our Privacy Policy for full details.

    Encryption

    Data encrypted in transit and at rest.

    External penetration testing

    Annual third-party penetration testing of infrastructure and application layers.

    Access control

    Role-based access control with least privilege. MFA required for all internal access.

    Internal security tooling

    We run EDR, SCA, SAST, and cloud security scanners on our own infrastructure. We practice what we preach.

    Vulnerability disclosure

    Report vulnerabilities to security@konvu.com. See our security.txt.

    Frequently asked questions

    For any other questions, reach out to security@konvu.com. We will get back to you promptly.

    Ready to see how Konvu handles your data?

    Talk to us about deployment options, review our SOC 2 report, or explore our Trust Center.