Skip to content

Security

General Augment assumes prompts are untrusted. Security is handled outside the model.

  1. Prompt isolation scans project prompts for tokens or passwords.
  2. Pre-execution guards verify tenant, enabled tool, identity link, and input fields.
  3. Network isolation restricts worker egress to approved internal services.
  4. Tool permissions enforce action scopes, approvals, cooldowns, and per-tool limits.
  5. Rate limiting and audit logging record every sensitive action with PII filtering.

The agent never receives backend credentials.

Hermes tool -> internal proxy -> credential vault -> developer API

HIPAA mode applies strict PII filtering, disables conversation history persistence, and adds health disclaimers to health-related replies.

Audit logs should never contain raw access tokens, API keys, or user secrets. See Identity Linking for user resolution.