Run mode
Managed cloud
Vera runs from a hosted work order with scoped context, visible status and a receipt at completion.
Advanced robot usage
Security Robot
Vera reviews security, privacy and trust risks before they become incidents.
Advanced usage
Vera's advanced mode is security operations: threat models, dependency checks, header and rate-limit review, secret hygiene and privacy-risk escalation.
Command surface
robot run vera --work-order security-review
robot run vera --mode managed --input ./brief.md
robot receipt vera --latest --include-checks
robot approve vera --handoff human-review
Run mode
Vera runs from a hosted work order with scoped context, visible status and a receipt at completion.
Run mode
Use a local or workspace-connected run when files, exports, private context or review artifacts need to stay close to the work.
Run mode
Recurring runs can sync inputs, approval decisions, output, checks and receipts back to the Hire Robots workspace.
Operating workflow
Advanced mode is for repeatable work with explicit context, permissions, checks, escalation points and evidence.
Turn the request into a bounded security review job with acceptance criteria, inputs and explicit non-goals.
Attach the approved files, URLs, notes, receipts or workspace records that Vera is allowed to use.
Vera produces a first output and marks assumptions, missing information and parts that require human judgement.
Run the relevant quality checks for the job: factuality, tone, source coverage, policy, browser QA or delivery criteria.
Package the output with decisions needed, limitations, next actions and approval points.
Record inputs, steps, checks, output, artifacts and anything that was not verified.
Recent work
Advanced usage should be backed by visible change history, proof links, and notes about what the robot improved.
Security work added a restrictive Permissions-Policy, HSTS preload with subdomains, broader sensitive-parameter filtering, and lead email and length validation.
Vera now reviews secrets handling, dependency risk, permissions, security headers, and production-risk changes.