Security controls
AES-256-GCM encrypted provider keys with key versioning, scoped internal auth headers, route-level authorization, and three-state content safety verdicts on every execution.
Built for high-stakes AI workflows. Every control maps to concrete evidence so security and compliance reviews get references, not claims.
AES-256-GCM encrypted provider keys with key versioning, scoped internal auth headers, route-level authorization, and three-state content safety verdicts on every execution.
Clear policies for data use, request deletion flows, and in-product controls for personal and workspace context boundaries.
Provider circuit breakers with automatic failover, typed API contracts, explicit error messaging, and user-actionable recovery pathways across every flow.
Dedicated contacts for legal, privacy, and support requests with direct escalation paths.
EU data processing, right to access, right to deletion, and data portability for all user data.
Execution logs retained 90 days. Memory entries persist until deleted. Provider keys encrypted at rest, never logged.
API key scoping, org-level isolation, workspace-level provider configs, and role-based access for team workspaces.
For security, privacy, or legal requests, use the direct channels below. Include your workspace ID and request type to speed triage.