The Delve Compliance Scandal: How a YC-Backed Startup Faked 494 SOC 2 Reports | Lorikeet Security Skip to main content
Back to Blog

The Delve Compliance Scandal: How a YC-Backed Startup Faked 494 SOC 2 Reports

Lorikeet Security Team March 20, 2026 12 min read

On March 19, 2026, an investigative report revealed that Delve, a Y Combinator-backed compliance automation startup valued at $300 million, had been generating fabricated SOC 2 audit reports for over 400 companies. The reports were 99.8% identical across all clients, contained pre-written audit conclusions, and were issued through auditors traced to Indian certification mills operating through US shell structures.

This is not a case of cutting corners. This is compliance fraud at industrial scale, and it has implications for every company that relied on a Delve-issued SOC 2 report, every enterprise buyer that accepted one, and every vendor in the downstream supply chain.


What happened

Delve was founded in 2023 by MIT dropouts Karun Kaushik and Selin Kocalar. The company marketed itself as delivering compliance certifications "in days" through "agentic AI" and raised $32 million in Series A funding at a $300 million valuation led by Insight Partners in July 2025.

In December 2025, a publicly accessible Google Spreadsheet was discovered containing links to hundreds of confidential audit reports. An employee had shared the spreadsheet in Slack with "anyone with the link" permissions. The spreadsheet was indexed by search engines and archived online before Delve could remove it.

The leaked folder contained approximately 575 files: 494 SOC 2 reports and 81 ISO 27001 documents. Analysis of these documents revealed systemic fabrication.

The mechanics of the fraud

Pre-written audit conclusions

Delve generated complete SOC 2 audit reports, including the Independent Service Auditor's Report (Section 1) and all test procedures and conclusions (Section 4), before clients had provided their company description, network diagrams, or signatures. The auditor's conclusion existed before the auditor had anything to audit.

Template reports at scale

Analysis of the leaked documents revealed 99.8% identical language across 494 SOC 2 reports. The same grammatical errors appeared verbatim in nearly all reports. Every client received the same security programme description, the same infrastructure descriptions, regardless of size, industry, or actual architecture.

All 259 Type II reports claimed zero security incidents, zero personnel changes, and zero cyber incidents during their observation periods. Across hundreds of different organizations, this is a statistical impossibility.

Fabricated evidence

The platform offered clients one-click adoption of pre-fabricated evidence including:

Certification mill auditors

The investigation identified Delve's primary audit partners as Indian certification mills operating through US shell structures:

For a handful of marquee clients like Lovable and Bland, Delve used more reputable auditors such as Prescient Assurance and Aprio, and compliance for those clients was conducted mostly off-platform using expensive external vCISOs.

Who was affected

The leaked reports identified over 400 companies, including some processing Protected Health Information for millions of US citizens and some serving national defense interests. Notable affected companies include:

Delve's own marketing claimed 1,700+ customers by early 2026, suggesting the leaked 494 reports may represent only a fraction of the total.

The industry response

Lovable publicly stated they are not a Delve customer, having proactively moved to Vanta in late 2025. Their SOC 2 Type II was independently audited by Prescient Security.

Prescient Security stated they formally disengaged from Delve in September 2025 and audited their Delve-associated clients independently using standard audit methodologies.

Delve published a response titled "Response to Misleading Claims" arguing they are merely an automation platform and that customers are responsible for reviewing and finalizing their own materials. CEO Karun Kaushik initially dismissed the investigation as "an AI-generated email" with "falsified claims."

The deeper problem: Multiple industry commentators noted that the Delve scandal is an extreme manifestation of existing problems in the SOC 2 ecosystem, not an isolated anomaly. As one Hacker News commenter put it: "80% of compliance has always been a performative box checking exercise. Delve just delivered the product that every company wanted: make the box checking faster."

Legal exposure for affected companies

Companies that relied on Delve-issued reports face significant legal and regulatory risk:

The cascading trust problem

The SOC 2 ecosystem relies on downstream trust. Enterprise buyers accept vendor SOC 2 reports as proof of security controls. If those reports are fabricated, every company in the supply chain that relied on them has a gap in their own risk assessment, creating a domino effect of unverified compliance claims.

This is not theoretical. If your organization accepted a SOC 2 report from any of the 400+ affected companies during vendor onboarding, your own compliance posture now has an unverified dependency. Your auditor may need to be notified.

What this means going forward

The Delve scandal exposes structural weaknesses in the self-policing attestation model where companies select their own assessors. It raises fundamental questions about whether the current SOC 2 framework can resist a "race to the bottom on price and speed" when venture-backed startups are incentivized to move as fast as possible.

For companies currently pursuing or maintaining SOC 2 compliance, the takeaway is clear: there are no shortcuts to genuine security. A compliance report is only as trustworthy as the process behind it. If your compliance vendor promises SOC 2 "in days," you should ask what is being skipped.

Need a legitimate compliance assessment?

We provide genuine penetration testing and compliance support with real security engineers, not AI-generated templates. Every engagement is scoped, tested, and reported by humans.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!