Security & data

Organized like a well-run team.

Agents have explicit access levels. Workspaces are hierarchical. Permissions cascade correctly. Your deal analyst cannot touch your personal files. Enterprise-grade from day one.

01 · The access model

ROOT and SCOPED. That's it.

ROOT agents have full access. SCOPED agents see only the workspaces and files you grant. Cascading permissions. No implicit broadening. No hidden surface area.

ROOT
Full workspace + file tree + credentials
SCOPED · WORKSPACE
A single workspace — files, tasks, memory
SCOPED · TASK
Only the files attached to a specific task
Hierarchical access diagram
02 · Security pillars
01

Role-aware agents

Every agent has an explicit role and a scoped permission set. No implicit escalation.

02

Hierarchical workspaces

Workspaces cascade correctly. A parent is never leaked to a child unless you say so.

03

Encrypted at rest

Files, memory, and transcripts are encrypted with per-workspace keys.

04

Audit trail by default

Every agent action is logged and reviewable. Export the trail any time.

05

SSO & SCIM

Enterprise SSO (SAML, OIDC) and SCIM user provisioning from day one.

06

SOC 2 Type II

Compliance in progress. Full controls documentation available under NDA.

03 · Your data

Full export, any time, no friction.

One click, right from Settings. Every workspace, file, task, research report, and memory — yours, in a clean portable archive. Restore anywhere, or just keep it as your own offline backup. We earn loyalty with the product, not export friction.

Data

Create backups of your workspaces, tasks, and files. Restore from a previous backup.

Backup
Optional label (e.g. Before restructure)
Backup History
  • Before Q2 restructure
    Mar 15, 2026 · 142 MB
    Download
  • Pre-onboarding baseline
    Feb 02, 2026 · 38 MB
    Download