Kern logoKern

Security

Security controls and trust assurances

Kern is designed for enterprise environments that require clear trust boundaries, deterministic controls, and auditable execution outcomes.

Trust boundaries

Customer systems define policy and business intent. Kern enforces orchestration, execution controls, and validation policy before returning final structured results.

Tenant isolation

Requests are scoped to tenant credentials and policy context. Isolation boundaries are maintained throughout task creation, execution, and result delivery.

Dual-AI validation assurance

Critical verification paths apply dual-model review to reduce single-model bias. Final status decisions include conflict handling logic and auditable state transitions.

Idempotency

Use a stable idempotency key per logical request to avoid duplicate task creation during retries or network failures.

await kern.tasks.create(payload, {
  idempotencyKey: "task-2026-02-14-store-123",
});

Rate limiting

Endpoints enforce request budgets to protect platform reliability. Handle 429 responses with exponential backoff and jitter while preserving idempotency keys.

Webhook signing

Verify webhook signatures before processing events.

import crypto from "node:crypto";

function verifySignature(rawBody: string, signature: string, secret: string) {
  const expected = crypto
    .createHmac("sha256", secret)
    .update(rawBody)
    .digest("hex");

  return crypto.timingSafeEqual(
    Buffer.from(signature),
    Buffer.from(expected)
  );
}

Evidence integrity

Evidence payloads are tied to task identity and lifecycle metadata so downstream automation can apply deterministic acceptance and escalation criteria.