Trekport
Security

Built for air-gapped,
high-security deployments.

Trekport runs entirely on your machine. No cloud uploads. No telemetry. Your data and credentials never leave your network.

Air-gapped by default

Trekport Studio runs entirely on your machine. There is no cloud sync, no SaaS backend, no centralized service handling your migration. Your Oracle credentials, source schemas, and migration output never leave your environment.

No telemetry

Trekport Studio does not phone home with usage data, schema fingerprints, or PL/SQL fragments. Crash reports are opt-in and contain only stack traces, with no sensitive context attached.

Local execution only

Schema extraction, AST conversion, deployment orchestration, and data transfer all run on the operator's machine. The Oracle source and PostgreSQL target are connected only to that machine.

5-layer code protection

Trekport Studio ships as a native binary. Layers: (1) Cython compilation, (2) PyArmor runtime protection, (3) string encryption, (4) control-flow obfuscation, (5) GraalVM Native Image AOT. No Python bytecode is shipped.

Predictable supply chain

Trekport Studio is a single signed installer per OS. No package-manager network calls during run. No background updates. You control when to upgrade.

Compliance posture

SOC 2 Type II audit planned. DPA available for enterprise customers. The architecture is compatible with HIPAA, FedRAMP, PCI-DSS, and air-gapped government deployments.

Need a custom security review, vulnerability disclosure pathway, or penetration-test results?