The Kwyre Tiger Team

Purple hat penetration testing
on every product before it ships.

Our security team wears every hat — red, blue, and purple. Offensive testing, defensive hardening, and adversarial simulation by cybersecurity professionals who've worked both sides. Every Kwyre product is battle-tested before it reaches you.

47/47 Penetration Test Findings Resolved

Independent third-party penetration testing verified our security posture. All identified vulnerabilities have been remediated.

47findings identified
47findings resolved
100%remediation
0critical/high remaining
Mar 2026last assessment
Privacy Guarantees

Architecturally impossible to leak

Not privacy by policy. Privacy by engineering. Every guarantee is verifiable with standard network tools.

Zero Content Logging

Metadata only — timestamps and token counts. Conversation content is never written to disk, log files, or any persistent storage.

No Telemetry

Zero analytics. Zero error reporting. Zero update pings. Zero license callbacks. Verify with Wireshark — no packets leave your machine.

Monero (XMR) Payment

No payment record. No email required. No account creation. Fully anonymous purchase. One-time payment — no recurring billing.

Ed25519 Offline License Keys

License validation works without any network call. Cryptographic signature verification happens entirely on your machine.

Self-Delete Conversation

User-initiated cryptographic wipe via POST /v1/session/end. Session content overwritten with random bytes before clearing. Unrecoverable.

Uncensored — Never Refuses

Qwen3.5-4B Uncensored passes 0/465 refusal tests. Your sensitive investigation data, privileged documents, and classified-adjacent work product is analyzed without restriction. Security without censorship.

Verify It Yourself

Don't trust us. Check.

Linux: Network Sockets

ss -tp | grep python
Confirm: only 127.0.0.1

Linux: Live Monitor

watch -n 1 "ss -tp | grep python"
Confirm: only localhost

Windows: PowerShell

Get-NetTCPConnection | Where-Object { $_.OwningProcess -eq (Get-Process kwyre-server).Id }
Confirm: only 127.0.0.1

macOS: PF Firewall

sudo pfctl -a com.kwyre -sr lsof -i -n -P | grep python
Confirm: PF rules active, no outbound

FreeBSD: PF Firewall

sudo pfctl -a kwyre -sr sockstat -4 | grep python
Confirm: PF rules active, no outbound

Wireshark (Any OS)

Interface: loopback (lo) | Filter: tcp.port == 8000
Confirm: zero external traffic
Universal Protection

Same security. Every product.

Personal 6 layers
Professional 6 layers
Air (CPU) 6 layers
Custom LLM 6 layers
Compliance & Audit

Documentation your legal team needs

Formal attestation, deployment guides, and audit packages for regulated environments.

HIPAA

PHI protection

FINRA

Financial data

SOC 2

Trust criteria

GDPR

Data privacy

ITAR

Export control

FRE

Evidence rules

ABA

Attorney ethics

SOC 2 Deployment Guide

KWYRE-SOC2-001 · For Auditors & Compliance Teams

Maps Kwyre's 6 security layers to SOC 2 Trust Service Criteria. Includes pre-deployment checklist, evidence artifacts, and auditor FAQ. All 18 controls documented.

Security Architecture

Technical Reference · 6-Layer Defense Model

Layer-by-layer technical breakdown: localhost binding, process isolation (iptables on Linux, Windows Firewall on Windows, PF firewall on macOS/FreeBSD), dependency integrity, model weight verification, secure session buffer, and intrusion watchdog.

Data Residency & Privacy

GDPR · HIPAA · SOC 2 · ITAR · FRE · ABA

Data flow architecture, conversation lifecycle, cryptographic wipe procedures, and regulatory alignment for GDPR, HIPAA, ITAR, and attorney-client privilege.

Enterprise Audit Package

KWYRE-AUDIT-001 · Available on Request

Audit specifications, data flow diagrams, cryptographic control details, and pentest summary. Ready for your compliance team's review.

Compliance Attestation Letter

KWYRE-COMP-001 · Available on Request

Formal attestation for GDPR, HIPAA, SOC 2, FINRA, ITAR, FRE, and ABA. Present directly to your legal and compliance teams.

Incident Response Plan

KWYRE-IR-001 · Available on Request

Security event classification, response procedures, escalation matrix, and post-incident review process.

Live Endpoints
GET /audit — metadata-only compliance log with security control attestation  ·  GET /health — security stack status, watchdog, KV cache, streaming, VRAM usage

See the inference engine.

Qwen3.5-4B Uncensored (0/465 refusals). 6 domain LoRA adapters hot-swap at runtime. 4 backends: GPU, vLLM, CPU, MLX. Your sensitive data never refuses to be analyzed.