hyperswitch· 56 findings · 4 confirmed high · ELEVATED RISK
Compliance Risk Analysis
hyperswitch
https://github.com/juspay/hyperswitch
Scanned 2026-03-23 · OpenDocket V1 · Primary: Claude Sonnet · Review: Gemini 2.5 Flash
Important Limitations of This Report
This report is not legal advice and is not defensible in court. It provides directional guidance only. To obtain a defensible compliance assessment, engage a licensed attorney and certified auditor.

Scope limitations: Only public repository content was analyzed. Infrastructure configuration, deployment settings, operational policies, vendor contracts, and staff training are outside scope.

A true compliance audit would also review: vendor contracts and BAAs, staff training records, incident response procedures, physical security controls, and system audit logs — none of which are visible in source code.
Risk Assessment

This analysis identified 56 compliance patterns across GDPR, HIPAA, PCI-DSS, SOC2, SOX, TCPA. After independent verification by Gemini 2.5 Flash, 4 high-severity findings were confirmed and 52 were identified as possible false positives — likely pattern matches in documentation or configuration files rather than application source code. The 4 confirmed findings represent the primary areas requiring attention.

ELEVATED RISK
4 confirmed high-severity findings
45 total patterns identified · 52 flagged as possible false positives by independent review
What This Means If Unaddressed
FrameworkRegulatory BodyMax PenaltyEnforcement Trend
GDPR (9 high)EU DPAsUp to EUR 20M or 4% turnoverCross-border enforcement rising
TCPA (8 high)FCC$500-$1,500 per violationClass action filings at record levels
SOX (7 high)SEC / PCAOBCriminal penalties, delistingIT controls under increased scrutiny
SOC2 (7 high)AICPALoss of enterprise contractsMandatory for enterprise SaaS sales
PCI-DSS (7 high)PCI SSCFines $5K-$100K/monthv4.0 enforcement accelerating
HIPAA (7 high)HHS / OCRFines up to $1.5M/year per categoryIncreasing enforcement, record penalties in 2024
Top Findings
High RiskGDPRGDPR-003connector-template/mod.rs:593 · Review: CONFIRMED
Implement a comprehensive right to erasure system that includes: (1) a user-facing mechanism for data subjects to submit deletion requests, (2) automated workflows to process these requests within the
High RiskPCI-DSSPCIDSS-004aws/hyperswitch_aws_setup.sh:167 · Review: CONFIRMED
Implement restrictive CIDR blocks instead of 0.0.0.0/0 to limit access to only necessary IP ranges. Create separate VPCs or subnets for the cardholder data environment with dedicated security groups t
High RiskSOC2SOC2-010.github/ISSUE_TEMPLATE/bug_report.yml:88 · Review: CONFIRMED
Create and document comprehensive security policies that demonstrate the organization's commitment to integrity and ethical values. This should include: (1) an acceptable use policy defining appropria
Gemini Verification Layer
How to read this: The confirmed count is your action list. The false positive count shows where the scanner found keyword patterns in documentation rather than application source code. Click any finding to see exactly what evidence was found and why Gemini made its determination.
4Confirmed
0Context dependent
52Possible false positives
0Additional risk
Primary: Claude Sonnet (Anthropic). Verification: Gemini 2.5 Flash (Google). Neither constitutes legal advice.
Recommended Actions
High
Integrate a robust data deletion workflow, distinct from the `hyperswitch_masking::ErasedMaskSerialize` mechanism observed in files like `connector-template/mod.rs` and `crates/common_utils/src/request.rs`, to permanently remove personal data across all systems upon a valid erasure request. Relying on masking instead of comprehensive deletion is a direct violation of GDPR Article 17, Right to Erasure.
GDPR · GDPR-003 · Confirmed
High
Update the `aws ec2 authorize-security-group-ingress` commands within `aws/hyperswitch_aws_setup.sh` (lines 53 and 62) to use restrictive `--cidr` blocks instead of implicitly open rules for ports 80 and 22. Additionally, confirm that the security group referenced by `$RDS_SG_ID` (line 167) only permits inbound traffic from authorized CDE components. This action directly supports PCI DSS Requirement 1 by enforcing granular network segmentation for the Cardholder Data Environment.
PCI-DSS · PCIDSS-004 · Confirmed
High
Create and document comprehensive security policies, including acceptable use, data classification, and access management policies, as required by SOC2-010. While `.github/ISSUE_TEMPLATE/bug_report.yml` and `.github/ISSUE_TEMPLATE/feature_request.yml` refer to 'Contributing Guidelines', these do not substitute for formal security policies, and their absence poses a high risk to demonstrating the organization's commitment to integrity and ethical values.
SOC2 · SOC2-010 · Confirmed
High
Update `.github/CODEOWNERS` for `crates/router/src/workflows/payment_method_status_update.rs`, `crates/router/src/workflows/attach_payout_account_workflow.rs`, and `crates/router/src/services/authorization.rs` to require review and approval from a separate, independent team or individual. Failure to establish distinct roles for developing and approving changes to financial transaction processing code violates SOX segregation of duties requirements and elevates the risk of financial misstatement.
SOX · SOX-005 · Confirmed
Risk Scorecard
FrameworkHigh RiskConfirmedFalse Pos.MediumConcernNo Issue
GDPR919100
HIPAA7010111
PCI-DSS719210
SOC2719120
SOX717100
TCPA808000
Domains Detected
Fintech
97.2%
Saas
92.2%
Ecommerce
76.4%
Communication
34.0%
Healthcare
16.5%
Gdpr
8.3%
Sox
5.8%
Framework:
Severity:
GDPR
EU DPAs · Up to EUR 20M or 4% turnover
10 findings · 9 possible FP
GDPR-003
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The evidence in application source code (`.rs` files) references `hyperswitch_masking::ErasedMaskSerialize`, indicating a mechanism for handling masked or erased data. While this suggests awareness of data modification for privacy, it does not confirm the implementation of a comprehensive data *deletion* process required by GDPR Article 17, which is a common compliance gap if masking is used instead of full erasure.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[SOURCE] connector-template/mod.rs:593 ) -> CustomResult<Box<dyn hyperswitch_masking::ErasedMaskSerialize>, errors::ConnectorError> { [SOURCE] crates/common_utils/src/request.rs:68 Json(Box<dyn hyperswitch_masking::ErasedMaskSerialize + Send>), [SOURCE] crates/common_utils/src/request.rs:69 FormUrlEncoded(Box<dyn hyperswitch_masking::ErasedMaskSerialize + Send>), [SOURCE] crates/common_utils/src/request.rs:73 Box<dyn hyperswitch_masking::ErasedMaskSerialize + Send>, [SOURCE] crates/common_utils/src/request.rs:76 Xml(Box<dyn hyperswitch_masking::ErasedMaskSerialize + Send>), [SOURCE] crates/diesel_models/src/query/dashboard_metadata.rs:120 pub async fn delete_user_scoped_dashboard_metadata_by_merchant_id_data_key( [SOURCE] crates/euclid/src/dssa/state_machine.rs:117 fn destroy(&self, context: &mut types::ConjunctiveContext<'a>) { [SOURCE] crates/euclid/src/dssa/state_machine.rs:196 fn destroy(&self, context: &mut types::ConjunctiveContext<'a>) {
Finding
Does the system implement the right to erasure (right to be forgotten) under Article 17, allowing data subjects to request deletion of their personal data without undue delay?
Remediation
Integrate a robust data deletion workflow, distinct from the `hyperswitch_masking::ErasedMaskSerialize` mechanism observed in files like `connector-template/mod.rs` and `crates/common_utils/src/request.rs`, to permanently remove personal data across all systems upon a valid erasure request. Relying on masking instead of comprehensive deletion is a direct violation of GDPR Article 17, Right to Erasure.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
HIPAA
HHS / OCR · Fines up to $1.5M/year per category
10 findings · 10 possible FP
Possible False Positives (10)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
PCI-DSS
PCI SSC · Fines $5K-$100K/month
10 findings · 9 possible FP
PCIDSS-004
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The `aws/hyperswitch_aws_setup.sh` script directly defines network security configurations, specifically creating ingress rules for common ports (80 and 22) and associating a security group with an RDS instance, which is a high-risk area for PCI-DSS compliance if segmentation and least privilege are not strictly enforced.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] aws/hyperswitch_aws_setup.sh:167 --vpc-security-group-ids $RDS_SG_ID)" [CONFIG] aws/hyperswitch_aws_setup.sh:51 echo "Creating Security Group ingress for port 80..." [CONFIG] aws/hyperswitch_aws_setup.sh:53 echo "$(aws ec2 authorize-security-group-ingress \ [CONFIG] aws/hyperswitch_aws_setup.sh:60 echo "Security Group ingress for port 80 CREATED.\n" [CONFIG] aws/hyperswitch_aws_setup.sh:62 echo "Creating Security Group ingress for port 22..." [CONFIG] aws/hyperswitch_aws_setup.sh:64 echo "$(aws ec2 authorize-security-group-ingress \ [CONFIG] aws/hyperswitch_aws_setup.sh:71 echo "Security Group ingress for port 22 CREATED.\n" [CONFIG] aws/hyperswitch_aws_setup.sh:92 echo "$(aws ec2 authorize-security-group-ingress \
Finding
Does the system implement network segmentation to isolate the cardholder data environment (CDE) from other network segments, reducing the scope of PCI DSS compliance as described in Requirement 1?
Remediation
Update the `aws ec2 authorize-security-group-ingress` commands within `aws/hyperswitch_aws_setup.sh` (lines 53 and 62) to use restrictive `--cidr` blocks instead of implicitly open rules for ports 80 and 22. Additionally, confirm that the security group referenced by `$RDS_SG_ID` (line 167) only permits inbound traffic from authorized CDE components. This action directly supports PCI DSS Requirement 1 by enforcing granular network segmentation for the Cardholder Data Environment.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOC2
AICPA · Loss of enterprise contracts
10 findings · 9 possible FP
SOC2-010
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The primary analysis correctly identified a critical gap in documented security policies (SOC2-010). The evidence cited, references to 'Contributing Guidelines' in issue templates, does not fulfill the requirement for comprehensive security policies such as acceptable use, data classification, or access management, thus confirming the identified lack of appropriate documentation within the repository's visible scope.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .github/ISSUE_TEMPLATE/bug_report.yml:88 id: read-contributing-guidelines [CONFIG] .github/ISSUE_TEMPLATE/bug_report.yml:90 label: Have you read the Contributing Guidelines? [CONFIG] .github/ISSUE_TEMPLATE/bug_report.yml:92 - label: I have read the [Contributing Guidelines](https://github.com/juspay/hyperswitch/blob/main/d [CONFIG] .github/ISSUE_TEMPLATE/feature_request.yml:41 id: read-contributing-guidelines [CONFIG] .github/ISSUE_TEMPLATE/feature_request.yml:43 label: Have you read the Contributing Guidelines? [CONFIG] .github/ISSUE_TEMPLATE/feature_request.yml:45 - label: I have read the [Contributing Guidelines](https://github.com/juspay/hyperswitch/blob/main/d [DOCS] README.md:193 ## Contributing [DOCS] README.md:197 Please read our [contributing guidelines](https://github.com/juspay/hyperswitch/blob/main/docs/CONTR
Finding
Does the system demonstrate evidence of documented security policies, including acceptable use, data classification, and access management policies, as required under CC1.1 for the entity's commitment to integrity and ethical values?
Remediation
Create and document comprehensive security policies, including acceptable use, data classification, and access management policies, as required by SOC2-010. While `.github/ISSUE_TEMPLATE/bug_report.yml` and `.github/ISSUE_TEMPLATE/feature_request.yml` refer to 'Contributing Guidelines', these do not substitute for formal security policies, and their absence poses a high risk to demonstrating the organization's commitment to integrity and ethical values.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOX
SEC / PCAOB · Criminal penalties, delisting
8 findings · 7 possible FP
SOX-005
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The `.github/CODEOWNERS` entries directly indicate that a single team has ownership over critical financial transaction workflow and authorization source code, which is a clear segregation of duties risk for development and approval functions in a fintech context.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .github/CODEOWNERS:89 crates/router/src/workflows/payment_method_status_update.rs @juspay/hyperswitch-payment-methods [CONFIG] .github/CODEOWNERS:166 crates/router/src/workflows/attach_payout_account_workflow.rs @juspay/hyperswitch-payouts [CONFIG] .github/CODEOWNERS:130 crates/router/src/services/authorization @juspay/hyperswitch-dashboard [CONFIG] .github/CODEOWNERS:131 crates/router/src/services/authorization.rs @juspay/hyperswitch-dashboard [CONFIG] .github/data/cards_info.csv:7 424242,STRIPE PAYMENTS UK LIMITED,Visa,CREDIT,,UNITEDKINGDOM,,,GB,2015-07-22 16:41:32,2025-11-04 15: [CONFIG] .github/git-cliff-changelog.toml:92 # limit the number of commits included in the changelog. [CONFIG] .github/git-cliff-changelog.toml:93 # limit_commits = 42 [CONFIG] .github/workflows/CI-pr.yml:10 group: ${{ github.workflow }}-${{ github.ref }}
Finding
Does the system implement segregation of duties controls that prevent any single individual from having the ability to both authorize and execute financial transactions, or to both develop and deploy changes to financial systems?
Remediation
Update `.github/CODEOWNERS` for `crates/router/src/workflows/payment_method_status_update.rs`, `crates/router/src/workflows/attach_payout_account_workflow.rs`, and `crates/router/src/services/authorization.rs` to require review and approval from a separate, independent team or individual. Failure to establish distinct roles for developing and approving changes to financial transaction processing code violates SOX segregation of duties requirements and elevates the risk of financial misstatement.
Remediation refined by Gemini review
Possible False Positives (7)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
TCPA
FCC · $500-$1,500 per violation
8 findings · 8 possible FP
Possible False Positives (8)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
What This Analysis Covers

OpenDocket scans source code patterns — specifically whether code handles regulated data in compliance-aware ways. It searches for evidence of encryption, access controls, consent mechanisms, audit logging, and other patterns that regulators look for.

What It Does Not Cover
  • Only public repository content is analyzed
  • Files in .gitignore are not scanned
  • Infrastructure, deployment, and cloud configuration are outside scope
  • Operational policies and procedures are outside scope
  • This analysis covers code at time of scan — changes after scan date are not reflected
Legal Limitations
  • This report is not defensible in court
  • It does not constitute legal advice
  • It does not satisfy regulatory audit requirements
  • To obtain a defensible compliance assessment, engage a licensed compliance attorney and certified auditor
  • OpenDocket provides directional guidance only
How Findings Are Generated
  • Primary analysis by Claude Sonnet (Anthropic)
  • Verification by Gemini 2.5 Flash (Google)
  • Question libraries are open source and community-maintained
  • All questions cite regulatory source text
  • Questions have not been validated by a licensed attorney
Why Two Models?

Claude Sonnet scans broadly — it finds every pattern that could indicate a compliance risk. This produces a comprehensive set of findings but includes noise from documentation files, config references, and test data.

Gemini 2.5 Flash then challenges each finding independently. It asks: is this evidence from actual application code? Would a regulator actually find this concerning? Is the severity appropriate?

The result is a tiered output:

  • CONFIRMED — Gemini agrees this is a real risk
  • CONTEXT DEPENDENT — Risk depends on deployment/infrastructure
  • POSSIBLE FALSE POSITIVE — Likely noise, review before acting

The confirmed count is the number you should act on. The total count shows the full scope of what was examined.

Evidence Tiers

Evidence is classified into three tiers based on file type:

  • [SOURCE] — Application source code (.ts, .py, .go, .rs, etc.) — strongest evidence
  • [CONFIG] — Configuration files (.yml, .json, .toml, Dockerfile) — moderate evidence
  • [DOCS] — Documentation (.md, .txt, .html) — context only, cannot produce High Risk findings

A finding is only classified as High Risk if supported by at least two source code files with matching evidence. Documentation references alone produce Pattern of Concern at most.

How to Use This Report
  • Share with your engineering lead for remediation planning
  • Share with your attorney as a starting point for compliance review
  • Re-scan after remediation to track progress
  • Do not present this as proof of compliance