Security and Privacy Posture
Security and Privacy Posture
Security model
- Fail-closed behavior for unsafe operations.
- Deterministic policy/profile posture evaluation.
- Proof-chain verification for evidence integrity.
Privacy model
- Scan data remains local by default.
- Secret values are not extracted; only risk context is emitted.
Command anchors
wrkr scan --path ./scenarios/wrkr/scan-mixed-org/repos --json
wrkr evidence --frameworks soc2 --output ./.tmp/evidence --json
wrkr verify --chain --jsonQ&A
Does Wrkr collect or emit raw secret values?
No. Wrkr flags secret-risk context but does not extract and emit raw secret material.
Can Wrkr run fully local for private repositories?
Yes. Default scan and evidence workflows operate locally with file-based artifacts and no required data exfiltration path.
How does Wrkr prevent unsafe evidence operations?
Wrkr uses fail-closed checks and returns exit code 8 when an unsafe operation is blocked.