Security
DataGrout is built with security at every layer — from transport-level mutual TLS to runtime policy enforcement and cryptographic workflow verification. Every tool call is authenticated, authorized, policy-checked, and auditable.
Authentication
Four authentication methods, all enforced before any tool call reaches upstream integrations.
Runtime Security
Semantic Guards
-
Side effect controls (none / read / write / delete) enforced before execution
-
Destructive operation blocking — prevents delete, drop, purge, and truncate
-
Scope verification — agents can only access their configured integrations
Dynamic Redaction
-
Automatic PII detection — emails, phone numbers, SSNs, credit cards, addresses
-
Configurable masking strategies per field (scramble, apron, mask, fixed-length)
-
Server-side only — agents never see original sensitive values
Policy Cascade
-
Monotonic policy inheritance — child policies can tighten but never loosen restrictions
-
Server → integration hierarchy with per-integration overrides
-
Complete audit trail for every policy decision
Cognitive Trust Certificates
-
Ed25519-signed proof that workflows are cycle-free and type-safe
-
Budget verification — workflows cannot exceed credit limits
-
Tamper-evident certificate chains — child CTC IDs are covered by the parent signature
Transport Security
Network Security
Restrict access at the network layer before any authentication or policy check runs.
Cadence — Intelligent Loop Detection
Cadence goes beyond simple time-window deduplication. It understands the consequence of each tool call and detects whether the world state changed between identical calls — distinguishing a stuck agent loop from a legitimate retry or repeated query.
isError: false with structured guidance so agents can adapt.
Approval System
Require a human sign-off before sensitive tool calls execute. Configurable per server so you can enforce oversight exactly where you need it.
Approval Modes
-
Manual — require explicit approval from configured approvers before execution
-
Automatic — allow execution without human review when risk level is low
Quorum Controls
-
Configurable quorum — require one approver or a majority of the approval group
-
Single-rejection blocking — any approver can veto a pending tool call
-
Scoped by operation type — approvals can be required only for writes or deletes
DataGrout Certificate Authority
The root of trust for all platform identities and trust artifacts. Two separate key types serve distinct roles: ECDSA P-256 for X.509 client certificates (mTLS identity) and Ed25519 for signing Cognitive Trust Certificates, rule packs, and machine-client JWTs. The P-256 CA key is held in an AWS KMS hardware security module (FIPS 140-2 Level 2) — private key material never leaves the HSM.
~/.conduit/, or a custom directory.
Infrastructure
Compliance
We are actively working toward formal compliance certifications. For current security posture details or to request a security questionnaire, contact security@datagrout.ai.