A customer-controlled execution layer for evidence collection.
The web app plans, maps, reviews, and exports. The private runner executes browser/API/document collectors inside the customer's boundary and returns source-mapped, redacted, auditor-ready packages.
Private runner phases
Generate a project-specific runner manifest with allowed commands, evidence roots, and the local job store path.
Validate source mappings, target allowlist, credential presence, CMS blockers, and redaction policy before collection.
Run browser/API/manual collectors in the private runtime and write raw evidence to the project workspace.
Redact, approve, block, or reject artifacts before they become auditor-ready package inputs.
Generate checksummed source-row indexes and auditor packages only from approved evidence.
Secret resolution without product-side storage
Runtime environment
Current lowest-friction path for supervised CMS EDE dry-runs and authorized collection windows.
macOS Keychain
Useful for desktop runner installs where secrets should not live in shell history or project files.
1Password CLI
Good fit for teams already managing audit test credentials in 1Password.
HashiCorp Vault
Best fit for on-prem and private-cloud appliances with strict secret rotation requirements.
Cloud secret managers
Covers AWS Secrets Manager, Azure Key Vault, and Google Secret Manager deployment envelopes.
Deployment envelopes
Desktop runner
Fastest path for operator-led CMS EDE collection with local browser profiles and supervised MFA.
On-prem VM appliance
Best fit for regulated customers that need evidence collection inside the corporate network.
Private cloud container
Best fit for customers running audited apps in AWS, Azure, or GCP private networks.
Air-gapped transfer
Best fit when no direct SaaS callback is allowed and evidence packages move by approved transfer.