Security
DataGrout is built with security at every layer — from transport-level mutual TLS to runtime policy enforcement and cryptographic workflow verification. Every tool call is authenticated, authorized, policy-checked, and auditable.
Authentication
Four authentication methods, all enforced before any tool call reaches upstream integrations.
Runtime Security
Semantic Guards
-
Side effect controls (none / read / write / delete) enforced before execution
-
Destructive operation blocking — prevents delete, drop, purge, and truncate
-
Scope verification — agents can only access their configured integrations
Dynamic Redaction
-
Automatic PII detection — emails, phone numbers, SSNs, credit cards, addresses
-
Configurable masking strategies per field (scramble, apron, mask, fixed-length)
-
Server-side only — agents never see original sensitive values
Policy Cascade
-
Monotonic policy inheritance — child policies can tighten but never loosen restrictions
-
Server → integration hierarchy with per-integration overrides
-
Complete audit trail for every policy decision
Cognitive Trust Certificates
-
Ed25519-signed proof that workflows are cycle-free and type-safe
-
Budget verification — workflows cannot exceed credit limits
-
Tamper-evident certificate chains — child CTC IDs are covered by the parent signature
Transport Security
Network Security
Restrict access at the network layer before any authentication or policy check runs.
Cadence — Intelligent Loop Detection
Cadence goes beyond simple time-window deduplication. It understands the consequence of each tool call and detects whether the world state changed between identical calls — distinguishing a stuck agent loop from a legitimate retry or repeated query.
isError: false
with structured guidance so agents can adapt.
Warden — Adversarial Content Analysis
A three-tier content integrity pipeline that analyzes every tool interaction for prompt injection, intent misalignment, and policy violations. Each tier adds a layer of scrutiny — from fast protocol checks to deep adversarial adjudication.
Continuous Security
Security monitoring that improves with use. The platform observes tool call patterns, detects anomalies, and progressively converts expensive analysis into fast deterministic checks — defense that gets stronger the longer it runs.
Approval System
Require a human sign-off before sensitive tool calls execute. Configurable per server so you can enforce oversight exactly where you need it.
DataGrout Certificate Authority
The root of trust for all platform identities and trust artifacts. Two separate key types serve distinct roles: ECDSA P-256 for X.509 client certificates (mTLS identity) and Ed25519 for signing Cognitive Trust Certificates, rule packs, and machine-client JWTs. The P-256 CA key is held in an AWS KMS hardware security module (FIPS 140-2 Level 2) — private key material never leaves the HSM.
~/.conduit/, or a custom directory.
Infrastructure
Compliance
We are actively working toward formal compliance certifications. For current security posture details or to request a security questionnaire, contact security@datagrout.ai.