Security Practices

Built for Enterprise Trust

Agent Blueprint is designed with security at every layer. From authentication to AI output validation, we apply the safeguards that enterprise teams expect.

01

Authentication & Access Control

Enterprise-grade identity management via Auth0 with multi-tenant isolation. Role-based access control with partner scoping ensures users only access data they're authorized to see.

02

Data Protection

All data is stored in Supabase (PostgreSQL) with encryption at rest and in transit. PII patterns are redacted from stored reasoning traces. Tenant data is isolated at the application and database level.

03

AI & LLM Security

LLM outputs are validated against structured schemas before storage. No tool use or code execution by the model. All inputs are authentication-gated, and outputs are constrained to advisory content only.

04

Infrastructure

Hosted on Vercel with HTTPS everywhere and edge-level DDoS protection. CSRF protection on all mutating endpoints. Application-level rate limiting on API routes. No self-hosted infrastructure to patch or maintain.

05

Input Validation

All user inputs are validated through Zod schemas at the API boundary. Length constraints on user-facing fields prevent abuse. Inputs are sanitized before processing.

06

Responsible AI

All platform outputs are advisory. Humans review and approve every recommendation before action. No autonomous actions are taken. Customer data is never used for model training.

Questions about our security practices?

We're happy to discuss our security posture in detail.

Get in touch →