Skip to content

Running in Production

What an operator needs once the code is written. Porulle is hardened by audit (five-round adversarial security review, all criticals closed) but the wiring depends on you.

Adopter-facing security documentation lives in the Security Model (mirrored from the canonical SECURITY.md at the repository root) — threat model, what the framework defends against, what it does not, the rate-limit layers, cookie hygiene, CSP recommendations, SSRF guards, audit log scope.

That document is the one to send to a buyer’s security review team.