We use confidential computing. Secure enclaves provide cryptographic proofs of the code running on them. A user can build the open source code and compare the fingerprint to the secure enclave.
Lots of details in our tech primer here 

OpenSecret
OpenSecret Technicals
With our newly released Maple AI and the open sourcing of our OpenSecret platform code, we present this technical primer on how we built our confid...