Trust

What Cenelira is, who builds it, and what it does not claim.

Cenelira is a controlled publishing system for social posts. It refuses ambiguous destinations, binds approvals to the exact version reviewers saw, classifies failures with a typed cause, and produces a signed proof record per schedule. This page lists the mechanics that ship today, the support path, and the explicit set of claims that Cenelira does not make.

Every claim below maps to imported repo constants or files named in code on a linked mechanic page. No customer logos, no aggregate ratings, no fabricated testimonials, no ranked competitor comparisons.

What it is

A controlled publishing system, not a queue.

Cenelira schedules, validates the destination, binds approval to the exact version, classifies failures, and produces a signed proof record per schedule. The output is a provable workflow record, not a throughput number.

Who it serves

Agencies and brand teams who need a record.

Agency operators running multi-platform publish queues for clients; brand teams who need a reviewable record of who approved what version on which destination, and what actually happened at publish.

What it avoids

No certifications, audience claims, or invented social proof.

Today Cenelira ships the mechanics linked from this page. It does not claim SOC 2, ISO 27001, HIPAA, GDPR certification, audience guarantees, or compete on customer logos.

Entity

The vendor record.

Three facts ground the rest of the page. The product name and support contact are constants in src/lib/brand.ts. The declared scope is the union of every public mechanic page on this site.

Product name

Cenelira

Support contact

[email protected]

Declared scope

Controlled scheduling, approvals, publishing, recovery, and signed proof export across the public platform inventory: Instagram, Facebook, Threads, LinkedIn, YouTube, TikTok, Pinterest, X.

Who this is for

Trust earns its rent on teams who need a record.

Cenelira adds value where an approval that means "yes to the version I read" differs from an approval that means "yes in general," and where a failure without an owner is unacceptable. It adds less value when the team needs a high-volume queue with no audit responsibility.

For
  • Agency operators running multi-platform publish queues for clients who require an external review link and a per-platform decision record.
  • Brand teams who need a reviewable record of who approved which version on which destination, and what actually happened at publish.
  • Ops leads who want refusal at publish time when the destination is ambiguous, the grant is expired, or the captured review version no longer matches the current schedule.
  • Solo operators who want the same engine that agencies run, with team chrome removed.
Not for
  • Teams that want the cheapest queue with no audit responsibility. Cenelira prices for the engine, not the queue.
  • Buyers who want a vendor with SOC 2 or ISO 27001 attestations, SAML SSO, audit-log retention SLAs, or HIPAA coverage today. None of those are claimed.
  • Teams who treat external-reviewer identity as a legal signature. External reviewer identity on these links is self-declared, not authenticated.
  • Teams retroactively auditing posts that predate the connection. Wrong-account prevention runs at publish on schedules created in Cenelira.

Proof artifact

The signed record is the export.

Every shipping mechanic above ends in the same place: a row in the signed 17-field proof record. The PDF and CSV twin both carry every column, the verifier can recompute the HMAC-SHA256 signature from the canonical payload, and the signing secret is never embedded in the artifact.

The proof export records scheduleId, versionFingerprint, targetAccount, platform, publishAtISO, approverIdentity, approverSource, approvalTimestamp, invalidationReason, publishOutcome, publishedAtISO, platformPostId, exceptionCause, recoveryAction, recoveryActor, deliverySetId, and deliverySetMemberCount.

The verification recipe lives on the proof page: copy the canonical payload, recompute the SHA-256 digest, then recompute HMAC-SHA256 with the shared signing secret and compare it against the printed signature.

The proof export does not claim audience, reach, or authenticated identity for external reviewers. It records typed workflow state and platform response.

Support

One contact path. No SLA theater.

Support runs by email at [email protected]. Cenelira does not advertise round-the-clock coverage, instant response SLAs, or dedicated success managers. Procurement requirements that need a vendor questionnaire, a security packet, or a data processing agreement are answered per-engagement on the same address.

Public limitations

Where each shipped mechanic stops.

These are not refusals to ship. They are the honest edges of mechanics that already run in the publish path or in the export pipeline.

  • External reviewer identity

    External reviewers approve via a review link. Their identity is self-declared, not authenticated. Only internal workspace approvals are tied to a workspace user account.

  • Audience and reach

    No part of the proof export, the recovery surface, or any public claim on this site describes audience, delivery, or reach. The proof record reports platform response and workflow state, not impressions.

  • Past-content auditing

    Wrong-account prevention runs at publish time on schedules created in Cenelira. It does not retroactively audit posts that predate the connection.

  • Manual handoff cases

    Every supported platform has an auto-publish path. LinkedIn multi-image currently routes through the typed manual handoff path. Handoff packs records who completed the manual publish; it is not a permanent platform limitation.

  • Procurement controls

    No public claim today for SAML SSO, SCIM provisioning, audit-log retention SLAs, or workspace data residency selection. Procurement requirements are handled directly by email.

Does not claim

Cenelira does not claim any of the following.

Vendors in this category often ship the language below as ornament. Cenelira ships the absence on the public surface, so no procurement reviewer has to ask twice.

  • No external compliance certifications

    Cenelira does not claim SOC 2, ISO 27001, HIPAA, or GDPR certification. The trust layer that ships is the typed publish-path refusals, version-bound approvals, owned recovery, and signed proof export named on this page.

  • No audience guarantees

    Cenelira does not promise reach, delivery, engagement, or any audience outcome. The publish path either succeeds with a platform post id, refuses for a typed reason, or is recorded as a typed failure.

  • No invented social proof

    No customer logos, no fabricated testimonials, no aggregate ratings, no review schema. The public surface ships what is true today, not what would look impressive.

  • No competitor benchmarks

    Cenelira does not publish ranked comparisons against named competitors. The mechanics pages on this site describe what Cenelira does, named in code.

  • No round-the-clock support claim

    Support runs by email at [email protected]. Cenelira does not advertise round-the-clock coverage, instant response SLAs, or dedicated success managers.

Unknown / deferred

What this page is choosing not to invent today.

A careful reader of a trust page might expect each item below to be declared. Cenelira has chosen not to invent values for them on the public surface. Each row says what is missing and where to ask.

  • Legal entity registration

    The legal entity name, registration jurisdiction, and postal address are not declared on the public surface today. Procurement contacts that require this information should email [email protected].

  • External profile URLs

    Cenelira does not publish sameAs links to social profiles, press pages, or public registries. The Organization JSON-LD on the trust and home pages carries no sameAs array.

  • Static security and DPA documents

    Vendor questionnaires, security review packets, and data processing agreements are handled per-engagement by email rather than published as static downloads on this site.

FAQ

Short answers for evaluators.

What is Cenelira in one sentence?

Cenelira is a controlled publishing system for social posts: it refuses ambiguous destinations, binds approvals to the exact version, classifies failures with a typed cause, and produces a signed proof record per schedule.

Who builds it?

Cenelira is built by a small team. The legal entity name, registration jurisdiction, and postal address are not declared on the public surface today; procurement questions go directly to [email protected].

How does support work?

Support runs by email at [email protected]. Cenelira does not advertise round-the-clock coverage, instant response SLAs, or dedicated success managers.

What is the data exit story?

The signed proof archive is the export. Each proof record carries 17 fields, including approval, target account, platform, publish outcome, exception, recovery, and delivery-set columns. The PDF and CSV twin both leave the app, and the verification recipe is published on the proof page.

Do you hold security or privacy certifications?

No public claim today for SOC 2, ISO 27001, HIPAA, or GDPR compliance attestations. The trust layer that ships in Cenelira is the typed publish-path refusals, version-bound approvals, owned recovery, and signed proof export named on this page.

Which platforms are supported?

Cenelira supports controlled scheduling and publishing workflows across eight platforms with an auto-publish path on each: Instagram, Facebook, Threads, LinkedIn, YouTube, TikTok, Pinterest, X. LinkedIn multi-image currently routes through the typed manual handoff path documented on the handoff packs page.

Are external reviewers authenticated?

No. External reviewer identity on a Cenelira review link is self-declared. Internal approvals are tied to workspace user accounts; the version-bound approval page describes how decisions are bound to the SHA-256 reviewVersion at decision commit.

How does this page stay accurate?

Every claim on this page maps to imported repo constants or files named in code on the linked mechanic pages. The page carries a last-reviewed stamp; when a mechanic ships or its scope changes, the corresponding facts file and link are updated, and the stamp is bumped.

Last reviewed 2026-04-25

Trust · Cenelira – Cenelira