Skip to main content

Security Posture

The Polar Signals Profiler is an advanced tool designed for capturing profiling data. As the security of our users' data is paramount, we have crafted this documentation to address and clarify concerns related to the external hosting of profile data with the Polar Signals Cloud service.

1. Nature of Profiling Data

At Polar Signals, we specialize in continuous profiling, a distinct category within the observability stack. To understand the sensitivity of profiling data, it's important to distinguish it from other observability signals. Profiles reveal how code executes in production, highlighting which functions are hot, where time is spent, and how memory is allocated.

Unlike logs or traces, profiling data is not designed to capture user-level or request-specific information. Unless specifically instructed and instrumented to do so, it does not contain:

  • Personally Identifiable Information (PII)
  • Request payloads or session data
  • Tokens, secrets, or credentials

Instead, profiling focuses on system behavior over time, helping teams optimize performance without exposing sensitive user information.

  • Metadata About Code: The Polar Signals Profiler primarily collects metadata about your code.

    • It does not access or store:

      • Executable code
      • Source code
    • Metadata to translate memory addresses is extracted from binaries, and executable sections are zero'ed.

A Note on the "View Source File" Feature

Polar Signals offers an optional "View Source File" capability, enabling teams to upload source code for deeper profiling insights, such as highlighting the exact line of code causing performance bottlenecks.

  • This feature is strictly opt-in.
  • Uploaded code is not processed beyond its role in enhancing profile views.
  • We recommend reviewing internal data governance policies before enabling this feature to ensure alignment with your IP or source code handling policies.

2. Memory Content Security

  • No Memory Content Leaks: Rest assured, the profiler strictly confines its operations to CPU profiling, ensuring no exposure of memory content.

3. Advanced Security in Data Handling

  • Comparison with Other Profilers:

    • Other profilers tend to transfer the entire stack into the user-space. This method can inadvertently expose sensitive information, such as private keys.

    • Polar Signals Profiler's Advantage: The Polar Signals Profiler takes a unique approach by performing unwinding directly in the Kernel using eBPF. This ensures that only function memory offsets are sent to the user space, without exposing actual memory content. This information is also the only interface between Kernel and user space so accidental leaking is impossible through this channel.

4. Supply chain security

Polar Signals implements modern supply chain security standards.

  • Reproducible Builds:

  • Dependency Management:

    • Employ automated tools RenovateBot for continual updates against security vulnerabilities.
  • Code Scanning and Vulnerability Management:

  • Signature Verification:

    • Providing signatures for release artifacts to ensure integrity and authenticity using sigstore.

5. Network Endpoints

Using the Polar Signals agent involves communication with the Polar Signals Cloud service. The only endpoints needed for this communication are:

  • grpc.polarsignals.com (IP: 35.234.93.182, port: 443) for the gRPC push APIs, which upload the profiling data.
  • api.polarsignals.com (IP: 35.234.93.182, port: 443) for signed uploads of symbols of binaries.

Our Security Commitments

Security is foundational to everything we build. Polar Signals is:

  • SOC 2 Type II Compliant
  • Encrypted in transit and at rest
  • Equipped with role-based access controls, and strict permission boundaries
  • Undergoing yearly third-party penetration tests

These safeguards apply to all data types, including profiling data, to help you operate with confidence and control.

Disclosure

To disclose any security vulnerabilities please write to security@polarsignals.com.

Conclusion

Your data's security is our utmost priority. The Polar Signals Profiler has been meticulously designed to ensure the confidentiality and safety of the data it captures. With its commitment to superior security standards, you can confidently integrate Polar Signals Profiler into your workflow.

For any further questions or clarifications, please don't hesitate to reach out to our support team.