Security

Security and governance

Scoped execution with role-bound validation, approval gates, and short-lived credentials.

Pre-execution scope validation

Template-constrained task planning

Out-of-scope rejection with clear reasons

Ephemeral credential sessions

Scoped permissions per run

Automatic credential expiration