No Code Access
Mortar never requires access to your source code. We analyze compiled OpenAPI/Protobuf artifacts and telemetry metadata, ensuring your IP stays in your VCS.
Security & Trust
Mortar is engineered for the most security-conscious organizations. We treat your API contracts and release metadata with the same rigor you apply to your own production systems.
Mortar never requires access to your source code. We analyze compiled OpenAPI/Protobuf artifacts and telemetry metadata, ensuring your IP stays in your VCS.
All data in transit is protected via TLS 1.3, and data at rest is encrypted using AES-256 with customer-isolated encryption keys.
For Enterprise and Sovereign customers, Mortar can be deployed fully self-contained within your VPC, ensuring zero data egress.
Our practices are built to align with global standards.
We maintain a rigorous SOC 2 Type II audit schedule, covering the Security, Availability, and Confidentiality trust service criteria. Report available under NDA.
Every decision made by the Mortar authority layer is logged to an immutable audit trail, providing a verifiable record of who authorized what change and when.
Our integration agents utilize scoped, short-lived tokens and require only write access to audit logs and read access to target specifications.
If you believe you have found a security vulnerability in Mortar, please contact us at security@mortar.systems. We respond to all reports within 24 hours.