The Security Audit Was Over in Minutes ── How Building on GitHub Inherits World-Class Governance at Zero Cost

A payment provider asked about two-factor authentication, penetration testing, vulnerability monitoring, sensitive data handling. Every answer was the same: GitHub. A zero-server design changes what security even means.

The point of this essay: Security is not about building security infrastructure. It's about choosing the right infrastructure to build on. A design that holds no data on its own servers, running entirely on GitHub, inherits world-class security governance for free. When an audit finishes in minutes, that's not luck — it's the design working as intended.

1. Opening the Assessment

Integrating a payment provider requires a security governance assessment. The provider wants to confirm what kind of security posture you maintain before allowing you to process transactions.

For a large organization, a dedicated security team might spend weeks compiling the response. I opened the questionnaire and braced myself.

Almost every answer turned out to be the same.

2. What Was Asked, What Was Answered

The assessment covered roughly the following ground:

Do you enforce two-factor authentication?
Do you conduct regular penetration testing?
Do you have vulnerability monitoring in place?
Are sensitive data kept out of publicly accessible locations?
How is access control managed?

The answer to each was: GitHub.

Two-factor authentication is enabled by default in GitHub settings. Penetration testing is conducted continuously by GitHub itself at global scale. Vulnerability monitoring runs automatically via Dependabot. Sensitive data doesn't exist on any server. Access control is managed through GitHub repository settings.

3. Why This Happens

This product's infrastructure exists entirely on GitHub. Code lives in GitHub repositories. Delivery runs on GitHub Pages. Automated processes run on GitHub Actions. Customer personal data is never transmitted to any server — it stays on each user's own device.

Which means there is no proprietary server for an attacker to target. No entrusted data that could be breached. No independent infrastructure to compromise.

Most security risk originates from holding things. Hold data and you must protect it. Run a server and you must monitor it. Hold nothing and the attack surface shrinks to nearly zero.

4. Standing on the Giant's Shoulders

GitHub serves over a hundred million developers worldwide. Its security posture is far beyond what any individual or small team could build independently. Dedicated security engineers monitor it continuously. External firms conduct regular penetration tests. Vulnerabilities are patched immediately.

Building on GitHub means inheriting that posture directly. World-class security governance, at zero cost, by choosing where to build.

This is the old idea of standing on the shoulders of giants made literal. By standing on something larger than yourself, you reach heights you couldn't reach alone. In security terms, that height translates to passing audits that would otherwise require months of preparation.

5. Security Is Chosen, Not Built

Security used to mean building things. Install a firewall on your own server. Deploy an intrusion detection system. Monitor logs. Commission annual external audits. Having a "security posture" meant having built all of this yourself.

That's shifting. Choosing trustworthy infrastructure and building on top of it is increasingly the core of security design. Choosing GitHub, choosing Cloudflare, choosing major cloud providers — the selection itself constitutes the security architecture.

A zero-ownership design combined with a giants-shoulders design reduces the security audit to a single question: what infrastructure are you running on?

6. Another Strength of Staying Small

Large organizations take time on security assessments because they hold so much. Multiple servers, multiple databases, multiple services, multiple teams — each requires its own documentation and proof.

Staying small and simple isn't a constraint on capability. It's a source of agility. Faster audits, faster responses, faster changes. Fewer things to hold means fewer things to defend. Fewer things to defend means faster movement.

This is one reason small teams can outmaneuver large ones. The lightness of not holding things becomes speed, becomes low cost, becomes audit passage.

7. Design Purity Shows Up in the Length of the Form

Today I also wrote about cancellation instructions that took three lines. And a payment description that fit in twenty characters. And now a security assessment that collapsed to a single answer.

All of it grows from the same root: the principle of holding no data on servers. One choice at the beginning eliminates cascading complexity downstream.

Design purity reveals itself over time. When the audit is short, when the FAQ is short, when the explanation is short — that's evidence the design's core has been consistent throughout.

Security is not built — it's chosen. When a zero-ownership design meets a giants-shoulders design, the audit collapses to one question: what are you running on?

TokiStorage is a project dedicated to preserving voice, image, and text for 1,000 years — democratizing proof of existence.

Explore TokiStorage Read all essays