Published 2026-04-10 | Updated 2026-04-10 | LoadStrike Editorial Team
Review how LoadStrike handles self-hosted execution, licensing metadata, runtime access checks, and website data collection.
Give enterprise evaluators a clear product explanation of what the hosted licensing services receive and store.
Direct answer
What data does LoadStrike handle in the current product?
LoadStrike runs self-hosted in customer-controlled environments, while licensed execution uses hosted licensing services for runtime access checks and, for the Go SDK, runtime delivery.
Those services exchange runner, environment, version, and entitlement metadata rather than application request or response payload bodies. LoadStrike also stores the customer, billing, runner-binding, lease, and audit records needed to enforce license access and runtime limits.
Who this is for
Security, procurement, platform, and architecture teams evaluating what the LoadStrike-hosted control plane receives during licensed execution.
Why enterprise reviews slow down here
Enterprise reviews usually slow down when product pages stay high-level and the data-handling story is spread across multiple technical surfaces. This page brings the core licensing and website-handling picture into one buyer-facing summary.
What this page confirms today
This page connects the self-hosted product model to the licensing and website data used to operate the service, so teams can separate runtime execution in their own environment from the account, access, and support data handled by LoadStrike.
What to expect
Verified LoadStrike fit points
Self-hosted execution happens in customer-controlled infrastructure rather than in a LoadStrike-managed test runtime.
Runtime access checks use runner key, requested features, session id, test suite, test name, node type, machine name, environment classification, and device hash.
The Go SDK runtime delivery flow uses runner key, SDK, version, operating system, and architecture.
Licensing records include customer email plus billing and subscription identifiers needed for account management.
Runner-device bindings, runner leases, and audit events are stored to enforce license access and runtime policy.
Separate website privacy details are documented on the website privacy page.
Resources
Technical pages to review next
These public pages connect the control-plane explanation back to the documented product and buying path.
Use the security and compliance contact path for follow-up review.
Common questions
Common questions
Does LoadStrike store application payload bodies as part of runtime access checks?
No. Runtime access checks use runner, environment, version, and entitlement metadata rather than application request or response payload bodies.
What data should security and procurement teams review first?
Start with this page and the licensing and runtime access docs, then contact LoadStrike if your review needs questionnaires, procurement follow-up, or negotiated terms.
Where does website privacy fit into this picture?
Website analytics and contact-form handling are documented separately on the website privacy page so they can be reviewed independently from product runtime access and licensing data.
Related
Related documentation
Start with the implementation details that match this page.
This page explains how runner keys control runtime access. Read it when you need to understand the runner-key requirements, licensing surface, and the runtime-access fields involved.
Route security review or procurement follow-up to the LoadStrike team.
Next step
Next step
Use this page as the public starting point for security and procurement review, then move into the licensing docs or contact the LoadStrike team when the evaluation needs deeper review.