Security is the foundation.
pruv is a cryptographic primitive. Security is not a feature added on top. It is the entire product.
Cryptographic verification
SHA-256 hashing creates tamper-evident chains of state transitions. Every entry's XY proof is computed from the canonical representation of the before state (X) and after state (Y), combined with the timestamp and link to the previous entry.
The chain rule ensures that Entry[N].x == Entry[N-1].y. Any modification invalidates all subsequent hashes. Tampering is mathematically detectable.
Data protection
Auto-redaction patterns
Sensitive data is automatically detected and redacted before it enters the chain. Redacted values are replaced with hash commitments. The proof remains verifiable after redaction.
Infrastructure
Responsible disclosure
If you discover a security vulnerability in pruv, report it to security@pruv.dev. We acknowledge reports within 24 hours and provide a fix within 72 hours for critical issues.