Read-only OAuth scopes
The extension requests only vso.work and vso.project. It cannot create, modify, or delete Work Items. Audit-friendly: every API call is read-only by design.
Built for enterprise procurement. Read-only OAuth, stateless architecture, regional data sovereignty, and a transparent SOC 2 Type I roadmap.
Nexus Hub is engineered with privacy and security as design constraints, not afterthoughts. The architecture is stateless: customer Work Item content is processed in-memory and never persisted to disk. Only aggregated, anonymous telemetry leaves your Azure DevOps tenant.
The extension requests only vso.work and vso.project. It cannot create, modify, or delete Work Items. Audit-friendly: every API call is read-only by design.
The Nexus FastAPI service runs on Hugging Face Spaces with ephemeral storage. Work Item content sent for analysis is held in memory for the duration of the request and discarded after the response is returned. No customer content persists on disk.
Subscription state is keyed on Azure DevOps Organization GUID (X-Nexus-Org-ID). Cross-tenant data access is impossible by API design — there is no shared tenant context.
All communication between the extension, the Stripe checkout, and the backend uses TLS 1.2 or higher. Stripe handles PCI DSS Level 1 obligations for payment instruments.
Outgoing telemetry is limited to extension version, error counts, and feature-usage counters. No user identifiers, no work-item content, no tenant identifiers beyond the Org GUID required for licensing.
Payment processing is delegated to Stripe under their PCI DSS Level 1 certification. TRX22 never sees, stores, or processes raw payment instruments.
Engaged with a licensed CPA firm. Trust Service Criteria covered: Security, Availability, Confidentiality. Target completion: Q4 2026. See roadmap below.
Email security@trx22.com.br for responsible disclosure. PGP key publication scheduled with the SOC 2 Type I rollout.
Continuation of Type I with 12-month observation window. Target: Q4 2027.
Evaluation phase. Will be considered after SOC 2 Type II based on enterprise customer demand.
The audit is being conducted against the AICPA Trust Service Criteria. Below is the operational roadmap; specific evidence and findings are available under NDA to qualified prospective customers.
Initial gap analysis against SOC 2 Trust Service Criteria (Security, Availability, Confidentiality). Engaged readiness platform (Vanta or Drata under evaluation).
Information security policy. Acceptable use policy. Incident response plan. Vendor management program. Background check process. Training records. Access reviews quarterly.
Continuous monitoring of access reviews, vulnerability scans, change management, incident logs, and backup tests. Type I requires evidence at a single point in time; Type II requires sustained evidence over 12 months.
Licensed CPA firm performs the formal audit, producing the SOC 2 Type I report. Report available to qualified customers under NDA.
Sustained operating effectiveness over 12-month observation period. Higher assurance than Type I; expected by enterprise procurement at scale.
X-Nexus-Org-ID), Project ID, optional Extension ID for routingvso.work + vso.project)The backend currently runs on Hugging Face Spaces in their default region rotation. Customers requiring specific regional residency (US-only, EU-only, BR-only) are encouraged to contact enterprise@trx22.com.br — dedicated regional deployments are available under enterprise agreements.
For SIG questionnaires, vendor risk assessments, or DPA execution, write to security@trx22.com.br. We respond within 2 business days.
For enterprise procurement (POs, custom invoicing, multi-org licensing): enterprise@trx22.com.br