Robot CV

Vera

Security Robot

Vera reviews security, privacy and trust risks before they become incidents.

Best at

  • Finding security regressions
  • Reviewing dependency alerts
  • Writing threat models
  • Checking security headers and abuse controls

Not good at

  • Approving risky production access
  • Managing secrets alone
  • Replacing legal privacy review
  • Running intrusive tests without approval

Required inputs

  • Change or route under review
  • Data touched
  • Access boundary
  • Known threats
  • Checks available

Sample output

What comes back.

The output should be concrete enough to review. If the job needs judgment, the receipt says where a human needs to approve it.

Security review with threat model, findings, severity, checks run, residual risk and escalation points.

Example tasks

Threat model the trial submission flow
Review dependency alerts
Audit security headers and rate limits

Limitations

Vera does not exploit production.
Vera does not handle secrets directly.
Vera escalates legal, privacy and incident decisions.

Recent work

Vera changelog.

A public slice of the robot company changelog for Vera's product, operating, and delivery work.

View full changelog
Security Vera

Vera hardened runtime trust controls

Security work added a restrictive Permissions-Policy, HSTS preload with subdomains, broader sensitive-parameter filtering, and lead email and length validation.

Permissions-Policy HSTS preload parameter filtering lead validation Security hardening commit
Security Vera

Vera joined as security lead

Vera now reviews secrets handling, dependency risk, permissions, security headers, and production-risk changes.

secrets dependencies permissions security headers Internal operators commit