Skip to main content
Security

Security your team gets out of the box.

Scanners on every publish. Role-based access on every plan. A complete audit trail your security team can actually use.

Every plan

Four protections you don’t have to ask for.

These are not premium add-ons. Every AgentBundle account — Free included — ships with them by default, so the riskiest parts of running agents inside an org are covered before anyone has to think about them.

Secret scanner

Catches API keys, tokens, and credentials accidentally pasted into agent prompts or configs. Runs on every publish; if it trips, the publish is blocked before it can reach a teammate’s runtime.

Prompt-injection scanner

Catches jailbreak and override patterns hidden in agent prompts before downstream agents run them. Same publish-time gate as the secret scanner.

Role-based access

Owner, Admin, and Member roles per organization, enforced server-side — not just hidden in the UI. Your members only see and edit what their role permits.

Activity log

Every publish, install, edit, and role change is recorded with the actor and timestamp. The basic log ships on every plan; full retention and export are available on Business and above.

Business and above

Governance for teams that need a paper trail.

When your security or compliance team needs more than the always-on baseline, the Business tier adds controls you can hand to them with confidence.

Approval workflow
Configure N-required reviewers on agent publishes. Publishes hold until the configured reviewers sign off. Every approval and rejection lands in the audit log with the reviewer’s identity and timestamp.
Full audit log + export
Complete activity history with before/after diffs on every change. Export to CSV from the dashboard, or pull via the audit-export API for ingestion into your SIEM or warehouse.
Department-level admins
Delegate admin permissions to a specific department. The Sales department admin manages Sales agents; the Engineering department admin manages Engineering agents. Org owners retain final control.
Custom APM policy
Encode your organization’s rules — dependency allowlists, banned MCPs, allowed runtimes, required manifest fields — as policy that applies to every publish, every team. Detailed below.
APM policy

Lock down what your agents can do.

APM (Microsoft’s open packaging spec for agents) gives every package a manifest. Define an apm-policy.yml once. Every published agent in your org — across every team and every runtime — must comply. Enforced at publish, before a teammate can install anything that violates it.

Dependencies

Lock down which APM packages your agents can depend on.

  • Allowlist — glob patterns like org/** or community/safe-tools. Empty means open.
  • Denylist — blocked even if allowed by a pattern above (e.g. evil/**).
  • Required — packages every agent must include (e.g. org/baseline).
  • Cap — 1–10 dependencies per agent, or no cap.
MCP servers

Restrict which MCPs agents can require — and which transports are allowed.

  • Allowlist — registry refs or globs (e.g. github, linear). Empty means open.
  • Denylist — specific MCPs blocked (e.g. web-search).
  • Transports — pick from stdio, http, sse.
  • Transitive — MCPs pulled in indirectly must also pass the allowlist.
Compilation targets

Choose which apm pack —target outputs are allowed.

  • Claude Code
  • Cursor
  • GitHub Copilot
  • OpenCode
  • Gemini CLI
  • OpenAI Codex
  • Windsurf

Anything not selected is rejected at publish.

Manifest

Control what every apm.yml must declare and which scripts can run.

  • Required fields — every apm.yml must include them (e.g. description, license).
  • Allowed scripts — whitelist named scripts (e.g. build). Empty means no scripts allowed at all.

APM policy enforcement is available on Business and above. Policies are versioned and audited just like agents — every change shows up in the audit log with the actor, timestamp, and the prior policy text.

Version lifecycle

Take a bad version back.

Every publish is an immutable version. When something ships and you need to walk it back, the platform has three escape hatches.

Revert

Roll the canonical “live” pointer back to any prior version with one action. The bad version stays in history; the rolled-back version is what new installs pick up. Useful when you ship a regression and need to restore the last-known-good immediately.

Deprecate

Mark a version as deprecated. New installs of that version still succeed but ship with a warning header so consumers know to migrate. Existing consumers can keep running it while they upgrade. Useful for sunsetting old behavior gracefully.

Recall

Mark a version as recalled. New installs are blocked outright (HTTP 410 Gone). Use when a version contains a serious bug, a leaked secret, or a policy violation — anything that needs to stop spreading immediately. The audit log captures who recalled it and why.

All three are governed by the same role-based access and approval rules as publishing. The audit log records every status change with the actor, timestamp, and reason.

Your data exposure

What lives in AgentBundle, and what doesn’t.

Knowing the data surface is the first thing your security review will ask about. Here’s the short answer.

What’s stored
  • Agent definitions (prompts, skills, MCPs, guardrails)
  • Member metadata (work email, name, role)
  • Billing details
  • Audit events
What’s not
  • Conversation transcripts from your runtimes (Claude, Cursor, etc.)
  • Agent inputs or outputs at runtime
  • Anything we’d need to train a model on — we don’t operate one
Where it lives

Managed PostgreSQL operated by Neon, hosted in the United States. Encryption at rest is provided by the database; data in transit is TLS-protected. The full sub-processor list is in our privacy policy.

How it leaves

Account deletion is soft-delete first: the org is hidden from the UI immediately and queued for hard-delete after the retention window. Owners can restore during the window. Once hard-delete runs, the data is unrecoverable.

Compliance

What your auditors can rely on.

If your team needs an attestation or a specific regulatory answer, here’s where AgentBundle stands today and where it’s heading.

Attestations

FrameworkStatusNotes
SOC 2 Type IIPlannedPursued in line with enterprise customer demand.
ISO 27001PlannedPursued in line with enterprise customer demand.

Regulations

RegulationWhat you can expect
GDPRMinimal personal data is collected and never transferred outside our processors. Org-wide data export and account deletion are available through the in-product danger-zone tools. A data processing addendum is available on request.
CCPA / CPRAData export and account deletion are supported for any organization that requests it. Personal information is not sold; the in-product opt-out is therefore unnecessary but always honored if requested.
HIPAABusiness Associate Agreements are not currently signed; AgentBundle is not intended for storing protected health information. Reach out if your organization needs this.
Copied to clipboard