32 Enrichment Data Sources
Our 5-phase pipeline gathers security intelligence from authoritative sources to build comprehensive, evidence-based assessments.
Data Pipeline Overview
Data Pipeline Flow
Domain Input
saas-app.com
32 Sources
5-phase enrichment
AI Analysis
Claude extraction
Security Score
9 dimensions
Assessment
Detailed report
5-Phase Enrichment Pipeline
Each assessment progresses through 5 phases, gathering data from multiple sources before AI analysis produces the final score.
All 32 Data Sources
Review Platforms
Compliance Databases
Breach Databases
Public Documentation
Vendor Trust Centers
Official security pages and whitepapers
Security.txt
Vulnerability disclosure policies
Bug Bounty Platforms
Technical Scanners
Threat Intelligence
Infrastructure Intelligence
Domain Intelligence
AI Integration
API Documentation
Vulnerability Databases
Quality Assurance: The Boss Test
Every claim must be defensible if questioned by the most skeptical executive.
Zero Fabrication
When data is unavailable, we show "Insufficient Evidence"
Source Everything
Every claim cites its enrichment source
Confidence Transparency
0.0-1.0 scores show assessment certainty
Evidence-Based
Verifiable facts, not opinions or marketing
Limitations
What We Don't Assess:
- • Internal Security Controls — Requires vendor access or on-site audits
- • Source Code Security — Proprietary codebases are not accessible
- • Physical Security — Handled by cloud providers (AWS, Azure, GCP)
- • Employee Background Checks — Confidential HR data
For deeper validation, request vendor security questionnaires (VSQs) directly.