Kaitu LogoKaitu.io
k2 Protocol
Self-Deploy Guide
Routers
Download
Login

Security Audit Program

Code security audit completed by an independent oversight committee

In the AI era, code transparency no longer means publishing source code. Kaitu has established an independent oversight committee to conduct rigorous audits of core code. Audit conclusions are publicly released, protecting every user's security in a more responsible way.

Oversight Committee Audit Program Launch Date

April 14, 2026

Why an Oversight Committee Instead of Open Source?

1

Independent Oversight, Greater Credibility

The oversight committee is composed of independent security experts, free from commercial interests. Audit findings are traceable and reproducible, carrying more authority than arbitrary public disclosure.

2

Security Boundaries in the AI Era

Full source code disclosure in the AI era means certain governments can rapidly identify and exploit vulnerabilities. Committee audits strike the optimal balance between transparency and security.

3

Public Findings, Trustworthy Process

The committee's audit reports are publicly released to all users. No source code review needed — everyone can understand the security conclusions and improvements.

4

Continuous Auditing, Full Version Coverage

Every major release triggers a committee review, creating a continuous feedback loop — not a one-time disclosure that nobody maintains.

Who Can Initiate an Audit?

Audit requests must be verified by Kaitu before they can proceed, and applicants must publicly disclose their identity on this website. The following three types of entities are authorized to initiate a formal audit:

Oversight Committee

A standing body composed of independent security experts that can proactively initiate audits by authority, without additional application. Audit findings are mandatorily published.

Partners

Operators and enterprise clients who have signed partnership agreements with Kaitu can submit audit requests through the partner channel. Findings are shared within the scope of the agreement.

Trusted Certified Security Organizations

Third-party organizations holding internationally recognized security certifications (such as ISO 27001, CREST, or OWASP-certified bodies) can initiate specialized audits after credential verification.

Kaitu LogoKaitu

Secure and convenient network proxy solution

Product

  • Client Download
  • Smart Router Products
  • Retailer Program
  • Changelog

Support

  • User Guide
  • FAQ
  • Contact Us
  • Homeschool Setup Guide

Legal Terms

  • Privacy Policy
  • Terms of Service

愿上帝为你开路

© 2026 Kaitu LLC. All rights reserved.