Local by construction
Skills, agents, hooks, and the local UI all run on the developer's machine. The audit signal lives in the repo. No fastpace-hosted SaaS sits in the data path for the core product.
Honest current-state. fastpace is in design-partner phase — so this page tells you what's true today, what's in flight, and what's on the roadmap. No certifications we don't hold; no claims we can't substantiate.
Need the customer-facing artifact-driven version with self-serve evidence requests? Visit the trust portal at trust.fastpace.net →
These are operating principles, not certifications. Each one is structurally enforced by the product, not just promised on a marketing page.
Skills, agents, hooks, and the local UI all run on the developer's machine. The audit signal lives in the repo. No fastpace-hosted SaaS sits in the data path for the core product.
fastpace ships zero telemetry. We don't collect usage analytics, error reports, or session data. Updates are explicit (`npm update -g @fastpace-ai/fp` then `fastpace update`).
The CLI, skills, agents, hooks, and local UI are open source. Anyone — including your security team — can audit the runtime that touches your code.
Every guardrail change is approved by the operator and logged to the hash-chained audit log. We will not silently weaken your audit signal — and you can verify it with one command.
The honest version. Plus the prove-it commands so you don't take marketing copy at face value.
fastpace/audit.log and fastpace/manifests/. Never transmitted off the machine.walks the hash-chained audit log and reports any tampering since install.
lists every agent, runtime, MCP server, and identity active on this machine.
packages ADRs, audit.log, manifests, and AI-BOM into one auditor-ready tarball.
Honest about timing. We will not claim certifications we don't hold. Below is current status; security questionnaires are answered under NDA.
Need a security questionnaire (SIG, CAIQ, custom) answered? Email security@fastpace.net. Turnaround under 5 business days.
Distinct from the external attestations above: fastpace ships a
validated mapping doc (fastpace/docs/framework-mapping.md)
tying every primitive — F0.1 cryptographic identity, F0.2
hash-chained audit log, F0.3 discovery manifest, F0.4 agent
identity, F0.5 prompt redaction, F0.6 inventory, F1.1 run
manifest signing, F1.3 circuit breaker (with fleet-wide baseline),
F1.6 least-privilege bootstrap, F1.10 sensitivity-tagged context,
F1.11 approved-runtime registry, F1.12 sanctioned-install
attestation (with Sigstore bundle envelope), F1.13 org dashboard,
F1.14 RBAC + SAML envelope verifier, F2.1 reliability score,
F2.3 provenance-signed commits, F2.4 AI-BOM, F2.5 continuous
control monitoring, F2.6 trusted data taps, F2.7 red-team
harness, F2.8 Drata/Vanta push, F2.9 pre-merge audit gate,
F2.10 AI risk register, F2.11 org-wide policy engine, F2.12
open audit schema — to the controls in NIST AI RMF, ISO/IEC
42001, EU AI Act, SOC 2, ISO 27001, and GDPR. Each row points
at the artifact that demonstrates the control.
The mapping is the input the auditor reads first. External
attestations (above) certify the operating environment; the
mapping certifies what each fastpace install does. The
fastpace aibom generate --release <tag> output
is the per-release attestation envelope (CycloneDX-AI flavor)
that goes into a regulated software supply chain alongside SBOMs.
The new fastpace gate check --format github drops
straight into a GitHub Actions workflow to block merges that
lack provenance, audit-chain integrity, or a fresh AI-BOM.
Because the core product runs locally, the sub-processor list is short. Updated when changes occur; subscribe to be notified.
We treat security reports seriously and will not take legal action against good-faith researchers operating within this policy.
Email security@fastpace.net. Encrypt with our PGP key (fingerprint published below) for sensitive details.
Threat models that overpromise are a security smell. Here's a focused STRIDE-style read on the fastpace agent — public artifact, updated when the model changes.
fastpace verify reports any tampering.rm -rf /, git reset --hard, curl | sh and similar are blocked by the dangerous-command-guard hook.Customer notification within 72 hours of confirmation, regardless of jurisdiction. Status page at status.fastpace.net (forthcoming). Subscribe to security@fastpace.net for direct notifications.
Architecture deep-dive, security questionnaire, threat model walk-through, roadmap under NDA — all available on request.