Post-quantum encryption. Cryptographic proof. Hardware isolation on the roadmap.
Founders submitting to a VC firm hand over their most sensitive assets: source code, patent applications, financial models, technical architecture. Traditional firms protect this with NDAs and good intentions.
We protect it with post-quantum cryptography, timing-safe authentication, rate limiting, and cryptographic proof that the system does what we claim.
All founder data is encrypted using NIST-standardized post-quantum algorithms. This protects against both classical attacks today and quantum attacks in the future.
| Layer | Algorithm | Standard | Purpose | Status |
|---|---|---|---|---|
| Key Exchange | ML-KEM-768 + X25519 Hybrid | NIST FIPS 203 | Quantum-safe key agreement. Both classical and PQC must be broken to compromise. | LIVE |
| Data Encryption | AES-256-GCM | NIST SP 800-38D | Authenticated encryption of submissions using PQC-derived key. | LIVE |
| Report Signing | ML-DSA-65 (Dilithium) | NIST FIPS 204 | Tamper-proof diligence reports. Founders verify signature independently. | LIVE |
Why hybrid KEM? We combine classical X25519 with post-quantum ML-KEM-768. If either algorithm is broken, the other still protects the data. The shared secret is derived via HKDF-SHA256 from both contributions.
Why post-quantum now? Nation-states run harvest-now-decrypt-later campaigns—capturing encrypted traffic today to decrypt when quantum computers mature. Your source code submitted in 2026 could be decrypted in 2035 with classical encryption. With ML-KEM, it cannot.
Beyond encryption, Talon enforces multiple layers of defense in production today:
| Control | Implementation | Status |
|---|---|---|
| Timing-Safe Authentication | hmac.compare_digest — prevents timing side-channel attacks on token validation |
LIVE |
| Rate Limiting | slowapi — per-endpoint limits (e.g., 10/min on /submit, 30/min on /keys) | LIVE |
| CSP Security Headers | Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options | LIVE |
| TLS Certificate Generation | Automated TLS cert generation for encrypted transport | LIVE |
| Secure Data Destruction | Multi-pass overwrite + verification via /destroy/{id} endpoint |
LIVE |
| SQLite Persistence | Encrypted local database — no cloud database dependencies | LIVE |
Founder CLI Talon Server
| |
|--- GET /keys ------------------------->| Fetch server ML-KEM + ML-DSA public keys
|<----------------------------------------|
| |
|--- ML-KEM encapsulate + X25519 ECDH ---| Derive shared secret (both PQC + classical)
|--- AES-256-GCM encrypt submission -----| Seal code with PQC-derived key
| |
|--- POST /submit {encrypted} ---------->| Ciphertext enters server
| |
| [Decapsulate -> Decrypt -> Analyze] | Raw code exists only during analysis
| [Sign report with ML-DSA-65] | Tamper-proof output
| [Destroy raw data] | Cryptographic shredding
| |
|<-- 202 {submission_id} ----------------|
| |
|--- GET /report/{id} ------------------>|
|<-- {report, ML-DSA signature} ---------|
| |
|--- verify(signature) ------------------| Founder confirms report integrity
Talon runs six concurrent analyzers on every submission:
| Analyzer | What It Does | Method |
|---|---|---|
| Code Audit | Security vulnerabilities, hardcoded secrets, injection risks, unsafe patterns | Semgrep (1000+ rules) + LLM26 deep analysis |
| CVE Scanner | Known vulnerability detection, exploit probability scoring, dependency risk | OSV.dev + NVD + EPSS (api.first.org) |
| Patent Analysis | Patentable innovations, infringement risks, prior art indicators | PatentsView API + LLM26 analysis |
| Technical Benchmark | Architecture patterns, maturity level, complexity metrics, language detection | Code metrics + LLM26 assessment |
| Supply Chain | Dependency extraction, vulnerability detection, license compliance | Dependency parsing + LLM26 risk assessment |
| Report Signing | Cryptographic attestation of analysis results, tamper-proof report delivery | ML-DSA-65 (FIPS 204) digital signatures |
All models run locally. No founder data is sent to OpenAI, Anthropic, Google, or any third-party API. The LLM26 (Qwen2.5-Coder 7B) runs on local GPU hardware. During analysis, outbound network access is limited to public vulnerability databases (OSV, NVD, EPSS, PatentsView).
After analysis completes, raw submission data is destroyed:
Only the signed diligence report persists. The report contains structured findings—never raw source code, never file contents, never verbatim excerpts beyond short snippets cited in findings.
Talon uses invitation-based access. Founders cannot submit without a pre-shared token issued by the operator.
hmac.compare_digest to prevent timing attacksThe following capabilities are designed but NOT YET DEPLOYED. They require Azure Confidential VM infrastructure.
Phase 4 will deploy Talon on Azure Confidential VMs with AMD SEV-SNP (Secure Encrypted Virtualization — Secure Nested Paging). This technology encrypts all VM memory at the hardware level, meaning:
| Layer | Technology | Standard | Purpose | Status |
|---|---|---|---|---|
| Enclave Isolation | AMD SEV-SNP | AMD SEV-SNP API | Hardware-encrypted VM memory. Host OS cannot read enclave contents. | PLANNED |
| Hardware Attestation | Azure Confidential Computing | AMD SEV-SNP Attestation | Cryptographic proof of enclave integrity, verifiable by founders. | PLANNED |
Why this matters: Today, Talon protects data with post-quantum encryption in transit and at rest, plus immediate destruction after analysis. But during processing, data exists unencrypted in server memory. AMD SEV-SNP will close this final gap by encrypting memory at the hardware level, making data extraction physically impossible even with root access to the server.
When deployed on Azure Confidential Computing, the /attest endpoint will return a hardware-signed attestation report proving:
Founders will not need to trust SpringOwl. They will be able to cryptographically verify the enclave state before submitting.
/attest endpoint returns "platform": "dev-docker" indicating that hardware attestation is not yet active. In Phase 4, it will return "platform": "sev-snp" with AMD-signed measurements. The system will refuse to accept founder data if attestation indicates development mode.
Transparency requires acknowledging gaps:
Talon does not yet run on AMD SEV-SNP or any hardware enclave. During analysis, decrypted data exists in server memory. An attacker with root access to the server could theoretically read this data. Phase 4 closes this gap. In the meantime, we mitigate with: minimal analysis windows (data decrypted for minutes, not hours), immediate cryptographic destruction, restricted server access, and rate limiting.
PQC keypairs are currently stored as encrypted files, not in a Hardware Security Module. Azure Key Vault does not yet support ML-KEM or ML-DSA. We will migrate to Azure Managed HSM when PQC support is available.
We intend to launch a responsible disclosure program. Until then, security concerns can be reported to the contact below.
We are targeting SOC 2 Type II by 2027. Our position: certifications measure process compliance, not security. Equifax was SOC 2 certified. Our approach is architectural—post-quantum encryption makes harvested data useless, and Phase 4 hardware isolation will make data extraction physically impossible. Today, without hardware enclaves, we rely on encryption, immediate destruction, and access controls.
For technical reviewers, here is where each deployed security claim maps to code:
| Claim | Implementation | Status |
|---|---|---|
| ML-KEM-768 key exchange | src/openclaw/crypto/kem.py |
LIVE |
| ML-DSA-65 report signing | src/openclaw/crypto/dsa.py |
LIVE |
| Hybrid X25519 + ML-KEM | src/openclaw/crypto/hybrid.py |
LIVE |
| AES-256-GCM envelope | src/openclaw/crypto/envelope.py |
LIVE |
| Encrypted submission endpoint | src/openclaw/web_api/routes/submit.py |
LIVE |
| Timing-safe token auth | src/openclaw/web_api/middleware/auth.py |
LIVE |
| Rate limiting | src/openclaw/web_api/main.py |
LIVE |
| Analysis engine (6 concurrent) | src/openclaw/analysis/engine.py |
LIVE |
| Secure data destruction | src/openclaw/enclave/destruction.py |
LIVE |
| Submission lifecycle | src/openclaw/enclave/lifecycle.py |
LIVE |
| Attestation endpoint | src/openclaw/enclave/attestation.py |
DEV ONLY |
| Founder CLI (encrypt + verify) | src/openclaw/cli/submit.py |
LIVE |
The codebase is in a private repository. Access is available to qualified security researchers under NDA.
Document History:
Version 2.1 | February 14, 2026 | Separated deployed vs. roadmap capabilities
Version 2.0 | February 2026 | Rewritten from production codebase
Version 1.0 | February 2026 | Initial framework (superseded)
This document is public and may be shared with attribution.