Docs

Security

Sandbox isolation, network controls, and the coSPEC security model

Sandbox Isolation

Every run gets its own gVisor sandbox. gVisor intercepts system calls at the kernel level, preventing the agent from accessing host resources or other tenants.

  • No shared resources between runs or tenants
  • Non-root execution, no privilege escalation
  • Sandbox is destroyed after run completion

Network Access Control

All outbound traffic is blocked except explicitly allowed domains. The default allowlist covers git providers, the Anthropic API, and package registries.

Custom domains are configurable per template (up to 20). Private IP ranges (10.x, 172.16.x, 192.168.x, link-local) are always blocked.

See Templates — Network Access for the full default domain list.

Audit Trail

Every run action is logged: sandbox creation, git clone, agent messages, tool calls, and errors.

Audit log example

Authentication

  • API keys — prefixed (csk_live_*), hashed and never stored in plaintext. See API Keys.
  • Dashboard — session-based with email verification and OAuth (Google, GitHub).
  • Multi-factor authentication (MFA) — TOTP-based 2FA available for all accounts using email/password sign-in. Enable from Account Settings. Once enabled, a 6-digit code is required on every sign-in. Backup codes are provided at setup and can be regenerated at any time.

AI Security

Model Usage

We do not use your data to train any AI models.

The platform follows the BYOM (Bring Your Own Model) principle. You configure which models are used (e.g., Anthropic), while coSPEC handles orchestration, security controls, and execution.

Data and Privacy

Encryption in Transit

All communication with the platform is encrypted using HTTPS. With TLS 1.3 or TLS 1.2 enforced and modern cipher suites, we ensure secure communication between services.

Encryption at Rest

All persistent data stored by the platform is encrypted at rest. Databases, logs, and any other stored information are protected using strong encryption algorithms and secure key management practices.

Backup

Automated backups are performed regularly to ensure data durability. All backup data is encrypted and stored securely with controlled access.

Privacy

The system processes and stores operational data required to run agents and provide observability. This includes:

  • Prompts and agent responses
  • Execution logs
  • Audit and system events

All stored data is encrypted and accessible only to authorized components of the platform.

Data Retention

Operational data is stored for a limited period to support debugging, observability, and auditability. The retention period could be agreed contractually based on customer needs. After the retention period, data is securely deleted from all storage systems.

Data Transparency

All data stored by the platform is available to the customer through logs and the dashboard. Customers have full visibility into what information is stored, how it is used, and can access or delete it as needed. You can see everything which is stored in the system, including prompts, logs, and execution history.

Infrastructure Security

The platform infrastructure runs on Google Cloud Platform (GCP) and follows strict access control policies. All access to production systems is protected by strong authentication mechanisms, and network access is restricted through firewall rules. The sandbox environments operate with limited OS-level permissions to minimize the risk of security breaches.

Production Database Access Control

Access to production datastores requires strong authentication. It is strictly limited to authorized personnel and services.

Secret Management

All secrets used by the platform are stored and managed through a dedicated secure secret management service. We do not hardcode any secrets in code or configuration files. Secrets are stored in a centralized vault with strict access controls, ensuring that only authorized components and personnel can access them.

Account Authentication

Access to internal systems and services requires individual user accounts. Access is granted based on role and business need, with no shared accounts allowed.

On this page