Trust and policy

Security and data handling

Review how LoadStrike handles self-hosted execution, licensing metadata, runtime access checks, and website data collection.

Diagram showing self-hosted execution with runner-key validation and runtime access rules.
Give enterprise evaluators a clear product explanation of what the hosted licensing services receive and store.
Direct answer

What data does LoadStrike handle in the current product?

LoadStrike runs self-hosted in customer-controlled environments, while licensed execution uses hosted licensing services for runtime access checks and, for the Go SDK, runtime delivery.

Those services exchange runner, environment, version, and entitlement metadata rather than application request or response payload bodies. LoadStrike also stores the customer, billing, runner-binding, lease, and audit records needed to enforce license access and runtime limits.

Who this is for

Security, procurement, platform, and architecture teams evaluating what the LoadStrike-hosted control plane receives during licensed execution.

Why enterprise reviews slow down here

Enterprise reviews usually slow down when product pages stay high-level and the data-handling story is spread across multiple technical surfaces. This page brings the core licensing and website-handling picture into one buyer-facing summary.

What this page confirms today

This page connects the self-hosted product model to the licensing and website data used to operate the service, so teams can separate runtime execution in their own environment from the account, access, and support data handled by LoadStrike.

What to expect

Verified LoadStrike fit points

  • Self-hosted execution happens in customer-controlled infrastructure rather than in a LoadStrike-managed test runtime.
  • Runtime access checks use runner key, requested features, session id, test suite, test name, node type, machine name, environment classification, and device hash.
  • The Go SDK runtime delivery flow uses runner key, SDK, version, operating system, and architecture.
  • Licensing records include customer email plus billing and subscription identifiers needed for account management.
  • Runner-device bindings, runner leases, and audit events are stored to enforce license access and runtime policy.
  • Separate website privacy details are documented on the website privacy page.
Resources

Technical pages to review next

These public pages connect the control-plane explanation back to the documented product and buying path.

Pricing

Review the self-hosted commercial model and runner-key plan framing.

Website privacy

Separate website analytics and contact-form handling from runtime licensing data.

Common questions

Common questions

Does LoadStrike store application payload bodies as part of runtime access checks?

No. Runtime access checks use runner, environment, version, and entitlement metadata rather than application request or response payload bodies.

What data should security and procurement teams review first?

Start with this page and the licensing and runtime access docs, then contact LoadStrike if your review needs questionnaires, procurement follow-up, or negotiated terms.

Where does website privacy fit into this picture?

Website analytics and contact-form handling are documented separately on the website privacy page so they can be reviewed independently from product runtime access and licensing data.

Related

Related documentation

Start with the implementation details that match this page.

Licensing And Runtime Access

This page explains how runner keys control runtime access. Read it when you need to understand the runner-key requirements, licensing surface, and the runtime-access fields involved.

Cluster Overview

Cluster mode lets one LoadStrike run spread across multiple nodes. Use it when a single machine is not enough or when topology matters.

Quick Start

Build one basic request-step scenario around GET /orders/{id}, run it, and confirm the report before moving into correlation-specific features.

Related

Next steps

Keep moving with the most relevant follow-up pages.

Product

Reconnect the data-handling explanation to the self-hosted product model.

Pricing

Review the commercial model behind runner access and plan-gated runtime features.

Contact

Route security review or procurement follow-up to the LoadStrike team.

Next step

Next step

Use this page as the public starting point for security and procurement review, then move into the licensing docs or contact the LoadStrike team when the evaluation needs deeper review.