The principles
Six commitments shape every safety decision Studio makes:Plaintext minimization
Secrets exist as plaintext in the smallest possible blast radius for the shortest possible time. Nothing sensitive is stored on disk in clear; nothing sensitive enters the AI provider’s context unless you explicitly substituted it.
Approval before consequence
Read-only operations move freely. Anything that changes external state — a device command, a connector write, a credential decrypt for execution — passes through a classifier and an approval gate the user can see.
Tenant isolation by cryptography
Organization isolation is enforced not just by API guards but by per-org encryption keys in an HSM. Two orgs sharing infrastructure cannot read each other’s data even if the access control logic fails.
One AI provider, controlled region
All model inference goes through AWS Bedrock in
us-east-1. There is no path that ships your data to a third-party AI vendor or to Anthropic’s hosted API directly.Auditability over autonomy
Every meaningful action the agent takes — tool call, command staged, credential decrypted, share granted — is observable in real time and recoverable from history. Autopilot exists; surveillance of it is the price of using it.
Honest limits
Some things are not built yet. Some things never will be (because they conflict with operational reality). We document both. Buying decisions made on incomplete information cost more than the truth.
What’s on this tab
Threat model
What we’re defending against, what we’re not, and the assumptions our controls rely on.
Identity and access
Clerk for the user, Cognito for the AWS calls, organization isolation enforced top to bottom.
Vault and keys
Per-org KMS keys in a FIPS-validated HSM, AES-256-GCM envelope encryption, automatic 30-day DEK rotation, cryptographic shredding on org deletion.
Human in the loop
The trust-level model, tool classification, the approval gate, and how the steering controls let you stop or redirect a running agent in real time.
AI provider and data flow
Bedrock-only, model and region pinning, three-tier prompt cache, secret redaction before model context, and the boundary between local and cloud.
Agent and local runtime
Electron + Go sidecar architecture, what stays on your device, the local embeddings model, and how the desktop process talks to the backend.
Audit and telemetry
What’s logged, what’s redacted, what third parties get (Sentry, Amplitude), and how to disable optional telemetry.
Connectors and MCP safety
How third-party API credentials are stored, how MCP tool catalogs are gated, and what happens if a remote MCP server tries to misbehave.
Supply chain and updates
Code signing, notarization, update signature verification, the build pipeline, and the path from source to your machine.
Known limits and roadmap
The honest list of what isn’t done yet and what we’re working on. Read this before committing.