Loading…
Loading…
We don't just claim reliability — we prove it daily with automated audits and publicly visible results.
Stability percentage from the last 10 daily audits. The threshold line marks our 95% minimum — anything below triggers an immediate alert.
Every day at 06:00 UTC, an independent automated system fires 5,000 synthetic requests at the live production API — the same endpoints your application calls. No staging servers. No shortcuts. Real infrastructure, real results.
After the requests complete, a second process compares 1,000 golden records against historical baselines. If any response drifts from the expected behavior — a different verdict, a shifted confidence score, an unexpected edge-case result — our team is alerted immediately.
The results you see on this page come directly from that pipeline. Nothing is curated. Nothing is cherry-picked. This is raw production telemetry, updated every 24 hours.
Each daily audit covers three categories of test data, totaling 5,000 requests.
3,500 tests
Full-fidelity requests with complete, realistic signal data. These test the happy path — verifying that A3 returns correct age assessments for well-formed inputs across all supported demographics.
750 tests
Deliberately malformed, incomplete, or out-of-range inputs. These test defensive behavior — verifying that A3 rejects bad data gracefully and never returns a false-positive age assessment.
750 tests
Boundary conditions, unusual signal combinations, and adversarial patterns. These test resilience — verifying consistent behavior in the gray areas where most systems break down.
A detailed overview of how A3 protects your data at every layer — from request to response.
A3 is built on a stateless, zero-retention model. Every API request follows the same lifecycle:
There is no database. No cache. No queue. No S3 bucket for request data. The Lambda execution environment is ephemeral — each cold start begins with a clean state. Even during a hypothetical breach, an attacker would find no stored request data to exfiltrate.
All traffic is encrypted via TLS 1.3. The API enforces HTTPS-only connections. Older TLS versions (1.0, 1.1) are rejected at the gateway level.
Operational secrets (signing keys, API keys) are encrypted using AES-256 via AWS KMS. Billing ledger logs in CloudWatch are encrypted with AWS-managed keys. There is no request data at rest to encrypt.
Every age assessment returns an HMAC-SHA256 signed verification token. The token format is base64url(payload).base64url(signature). The payload contains only the verdict, bracket, confidence, and timestamp — no PII. Customers store the token in their own logs for audit trails and dispute resolution. Token verification is a free, read-only API call.
crypto.timingSafeEqual), preventing timing-based credential attacks.A3 operates three physically isolated log streams with strict data classification boundaries:
| Stream | Contains | Excludes | Retention |
|---|---|---|---|
| Analytics | Event type, verdict, signal count, region (hourly granularity) | Session IDs, user identifiers, behavioral values, evidence tags | 90 days |
| Billing | Timestamp, API key hash (SHA-256), request status, region | All assessment data, behavioral metrics, verdicts, raw API keys | 7 years |
| Errors | HTTP method, path, status code, stack trace (5xx only) | Request bodies, user data, API keys | 90 days |
The analytics stream uses k-anonymity principles: timestamps are truncated to the hour, and no combination of logged fields can identify an individual user or session.
We maintain a formal incident response plan with four severity tiers, defined response times, and communication procedures:
SEV-1 Critical
Confirmed unauthorized access, key compromise, or data breach. Response within 1 hour. Customer notification within 72 hours.
SEV-2 High
Suspected attack attempts, critical dependency vulnerabilities, or partial outages. Response within 4 hours.
SEV-3 Medium
Blocked attacks, non-critical vulnerabilities, single-customer issues. Response within 24 hours.
SEV-4 Low
Informational alerts and advisory updates. Response within 7 days.
Our zero-retention architecture is our strongest incident mitigation: even in a worst-case breach, there is no stored request data to exfiltrate. The most sensitive asset is the HMAC signing key, which can be rotated immediately. Previously signed tokens contain no PII and cannot be used to reconstruct user identities.
If you discover a security vulnerability in A3, please report it responsibly to [email protected]. We commit to:
Our security contact information is also published at /.well-known/security.txt per RFC 9116.