Technical Reference

The answers your engineers are looking for.

Your technical team has legitimate questions before they sign off on anything. Stack, security, architecture, integrations, build standards.

01 — How We Think

Four principles guide everything we build.

Security, reliability, and maintainability are not features we add. They are constraints we design within from the start.

Ready to build something that actually works?

Book Your Call
01 -- Security by Design

Architected In. Not Bolted On.

Zero-trust principles and defense-in-depth are baked into the architecture from day one. Security is an engineering constraint, not a compliance checkbox.

02 -- Defense in Depth

No Single Point of Failure.

Multiple independent layers of controls: network segmentation, encryption at every tier, strict access scoping. A breach at one layer does not compromise the system.

03 -- Continuous Improvement

We Evolve as Threats Evolve.

Regular penetration testing, vulnerability assessments, and monthly automated security audits. What was sufficient last year is not necessarily sufficient today.

04 -- Transparency

Nothing Hidden. Ever.

Open documentation on every security practice. Full support for due diligence reviews, security questionnaires, and technical deep-dives with your team.

02 — Tech Stack

We build with the right tool for the job.

Every technology choice is driven by your existing stack, your performance requirements, and what your team can own and maintain after we hand over.

Languages

Primary build languages

PythonTypeScriptNode.jsGoRustSQLBash / Shell

AI & ML

Models and frameworks

LangChainLlamaIndexOllamaHuggingFacePyTorchOpenAI APIAnthropic APIMistralLlama 3

Databases

Storage, vector, and cache

PostgreSQLMySQLMongoDBRedisPineconeWeaviateSupabaseChroma

Infrastructure

Cloud, containers, IaC

AWSGCPAzureDockerKubernetesTerraformGitHub ActionsOn-Premise

APIs & Integration

Protocols and frameworks

RESTGraphQLWebSocketsgRPCFastAPIExpressCeleryApache Kafka

Observability

Monitoring and logging

GrafanaPrometheusDatadogSentryELK StackOpenTelemetry

03 — Security

Security is architecture. Not a policy document.

Every system treats security as a first-class engineering concern, designed in from the first line of code, not retrofitted after deployment.

01

Data Never Leaves Your Environment

For private AI deployments, every model runs on infrastructure you control. No query, document, or output ever touches an external server. Enforced by architecture, not a vendor's terms of service.

Private by design
02

Auth & Authorisation

OAuth 2.0, JWT, and API key management as standard. Every endpoint scoped to minimum necessary access. RBAC, token rotation, and full audit logging across all systems.

Zero trust model
03

End-to-End Encryption

All data in transit encrypted via TLS 1.3. Data at rest uses AES-256-GCM with unique IV per operation. Regulated environments get envelope encryption with customer-managed keys.

TLS 1.3 + AES-256
04

API Security Hardening

Every API ships with rate limiting, input validation, injection prevention, and DDoS protection at the gateway layer. OWASP API Security Top 10 is the baseline, not the ceiling.

OWASP compliant
05

Compliance by Design

We design for your regulatory environment from day one. GDPR, SOC 2, HIPAA, FCA, and financial data regulations are architectural decisions, not documentation exercises bolted on at the end.

Regulation-aware
06

Audit Trails & Logging

Every action taken by every system is logged, timestamped, and queryable. Immutable audit logs, anomaly detection, and real-time alerting give your security team full observability.

Full observability

04 — Data Protection

Every layer of protection. Documented and verifiable.

The security domains across every system we build. Specific tools, standards, and controls, not marketing language.

01

Compliance & Standards

SOC 2 certified infrastructure vendors. OWASP Top 10 coverage. Monthly 11-suite automated security audit. CycloneDX SBOM on every dependency change.

SOC 2 · OWASP
02

Cloud Infrastructure

AWS, Vercel, DigitalOcean, Supabase, and Cloudflare, all SOC 2 certified. Docker for container isolation. Terraform for reproducible, version-controlled infrastructure.

SOC 2 Providers
03

Authentication & Authorisation

Supabase Auth with server-verified JWTs. HMAC-SHA256 signed tokens with 4hr TTL. Dual auth (JWT + API key), RBAC, OAuth 2.0 with scoped permissions, and crypto.timingSafeEqual.

Zero Trust
04

Encryption

AES-256-GCM at rest with unique IV per operation. TLS 1.3 in transit. HSTS preloaded (max-age=31536000). Encrypted geo-redundant backups and customer-managed key support.

AES-256 · TLS 1.3
05

Data Isolation

Row Level Security on 43 tables. Per-client dedicated databases. Schema isolation per domain. No client data in logs, no client data used for AI training, configurable data residency.

Per-Client Isolation
06

Input Validation

Zod for TypeScript runtime schema enforcement. Pydantic for Python request and environment validation. OpenAPI spec enforcement. 1MB JSON body limit. Startup environment validation.

Zod · Pydantic
07

Rate Limiting

Per-endpoint controls: Contact (3 req/min), Auth (5 req/min), API (30 req/min), Strict (3 req/5 min), Global (100 req/min per IP). Enforced via express-rate-limit.

Per-Endpoint Controls
08

Security Headers

Content-Security-Policy, X-Frame-Options: DENY, X-Content-Type-Options: nosniff, Referrer-Policy: strict-origin, HSTS + preload, Permissions-Policy, Helmet middleware, X-Powered-By removed.

HTTP Hardening
09

Webhook Security

Stripe (constructEvent signature), Plaid (JWKS + SHA-256 body hash, 5-min max age), Fireflies (timingSafeEqual). Signature verification on every inbound webhook.

Signature Verified
10

CI/CD Security

GitHub Actions with lint, typecheck, and build gates. npm audit on every CI run. CycloneDX SBOM generation. lint-staged + Husky pre-commit hooks. Code review required on every change.

Pipeline Controls
11

Monitoring & Audit Trail

Audit log covering auth, admin actions, rate limit hits, and permission denials. Error sanitization (generic to clients, full internally). Real-time alerting and monthly audit reports.

Full Observability
12

Vendor & Incident Management

SOC 2 required for all vendors. Regular supply chain posture assessments. Documented incident response with same-day client notification. Root cause analysis on every incident.

Supply Chain · IR

05 — Integrations

We work with your stack. Not around it.

We integrate with the tools your business already runs on. No forced migrations. No new software licences. No disruption to what is working.

01

Salesforce

CRM, leads, opportunities, contacts, custom objects, workflow triggers.

02

HubSpot

CRM and marketing automation via REST API and webhooks.

03

Stripe

Payments, subscriptions, invoicing, and webhook-driven reconciliation.

04

Xero / QuickBooks

Accounting sync, invoice management, expense categorisation, reporting.

05

SAP / Oracle ERP

Enterprise ERP via REST and SOAP, inventory, finance, and operations data.

06

Microsoft 365

Email, Calendar, Teams, SharePoint, and OneDrive via Microsoft Graph API.

07

Google Workspace

Gmail, Calendar, Drive, Sheets, and Docs via Google APIs with OAuth 2.0.

08

Slack

Bot integrations, event-driven notifications, and interactive workflows.

09

AWS Services

S3, Lambda, SQS, RDS, Bedrock, and the broader AWS ecosystem via SDK.

10

Custom Databases

PostgreSQL, MySQL, MongoDB, and any database with a connection string.

11

Proprietary Systems

If it has an API, a database, or a data export, we can integrate with it.

12

REST & Webhooks

Any system that speaks REST or fires webhooks, regardless of vendor or age.

06 — Build Standards

What every build includes. Without exception.

These are not upsells. They are the baseline. A single integration or a full private AI deployment, the standard does not change.

Full Source Code

You receive the complete, unobfuscated source code for everything we build. No proprietary wrappers. No compiled black boxes. Every line is yours.

Technical Documentation

Every system ships with full documentation: architecture diagrams, API specs, data flow maps, environment setup guides, and operational runbooks your team can actually use.

Test Coverage

Unit, integration, and end-to-end tests written for every critical path. We do not hand over a test suite you cannot run yourself.

API Versioning

Every API is versioned from day one with clear deprecation policies. You can introduce breaking changes without breaking existing consumers, ever.

CI/CD Pipeline

Automated build, test, and deployment pipelines configured and documented. Your team can ship updates from day one without manual deployment steps.

Engineering Handover

A live walkthrough with your engineering team covering every component: architecture decisions, codebase structure, deployment process, and ongoing maintenance procedures.

Zero Vendor Lock-In

Nothing we build creates a dependency on Syntora or any third-party platform. If we disappeared tomorrow, your systems keep running and your team maintains them independently.

07 — Technical FAQ

The questions your engineers are going to ask.

01
Architecture

How do you handle system failures and ensure uptime?

02
Security

How do you manage secrets and environment variables?

03
Data

How do you handle PII within AI pipelines?

04
Infrastructure

Can you deploy to our existing cloud or on-premise environment?

05
AI

What happens when an AI model produces incorrect or unexpected outputs?

06
Scale

How do your systems handle volume spikes and horizontal scaling?

07
Handover

What does your team need from us before the build starts?

08
Ownership

Do you retain any access to our systems after handover?

Every great build starts with a conversation

You don't have to figure this out alone. That's exactly what we're here for.

Book Your Call

Contact

Have questions? Let's figure out what's possible together.

Drop us a message and we'll get back to you within 24 hours.