▶ PassThru
Platform Pricing Docs Dashboard

Security

PassThru Security White Paper · Version 1.0 · April 2026

0
Keys Exposed
0
Code Vulnerabilities
7
Security Layers
—
Live CVE Scan
Loading live security status…

Private Key Never Leaves the Vault

PassThru uses Azure Key Vault's CryptographyClient for remote signing. The private key used to sign Apple Wallet passes is generated inside Key Vault and is never exported, downloaded, or transmitted outside of Key Vault.

  1. Your app builds the pass manifest and computes a SHA-256 hash
  2. The hash (32 bytes) is sent to Key Vault over TLS
  3. Key Vault signs it using the RSA-2048 private key inside HSM-backed storage
  4. Only the signature bytes come back — never the key
  5. The signed pass is assembled and delivered

Network Isolation

All backend services run inside an Azure Virtual Network with no public internet access:

ResourcePublic AccessHow It's Accessed
API Gateway (APIM)Yes (rate-limited)HTTPS — only public entry point
Function AppNoAPIM + CI/CD only (IP allowlist)
Cosmos DBNoPrivate endpoint via VNet
Key VaultNoPrivate endpoint via VNet

7 Layers of Security

LayerControl
1. AuthenticationFirebase Auth + Google OIDC with Cloudflare Turnstile
2. API KeysSHA-256 hashed, 256-bit entropy, tenant-scoped
3. GatewayAPIM validates JSON schemas, rate limits, adds security headers
4. Function KeysAzure platform-enforced auth on all management endpoints
5. NetworkVNet isolation, no public access to Function App
6. Private EndpointsCosmos DB + Key Vault only reachable inside VNet
7. Managed IdentityRBAC with least-privilege roles, zero credentials in code

Encryption

PurposeMethod
Data at restAES-256 (Azure-managed keys)
Data in transitTLS 1.2+
Pass signingRSA-2048 + SHA-256 (PKCS#7)
API keys at restSHA-256 hashed (irreversible)
Key Vault storageHSM-backed (FIPS 140-2 Level 2)
APNs pushMutual TLS (client certificate)

Automated Certificate Lifecycle

Signing certificates are automatically renewed before expiry:

  1. Timer checks cert expiry every 2 weeks
  2. CSR generated inside Key Vault (private key stays in vault)
  3. CSR submitted to Apple's App Store Connect API
  4. Signed cert merged back into Key Vault

No manual certificate handling. Fully automated and auditable.

Vulnerability Scanning

ToolScopeResult
Semgrep246 rules, 46 source files0 findings
GitleaksSecret detection across all commits0 real findings
npm audit (backend)All production dependencies0 vulnerabilities
npm audit (dashboard)All production dependencies0 vulnerabilities

CI/CD Security

  • OIDC deployment — no stored Azure credentials in GitHub
  • No secrets in code — enforced via Gitleaks scanning
  • Automated builds — every push triggers build + deploy

Compliance

FrameworkStatus
GDPRAligned — DPA available on request
CCPABelow threshold — privacy policy in place
SOC 2Controls aligned — audit available on request
PCI DSSNot applicable — no cardholder data stored

Incident Response

In the event of a data breach, affected tenants will be notified within 72 hours. A post-incident report will be provided within 30 days.

Contact

For security inquiries or to report a vulnerability:
Marckoy Industries LLC
Email: support@passthru.dev

© 2026 Marckoy Industries LLC. All rights reserved. · Privacy · Terms · Security