Security
General Augment assumes prompts are untrusted. Security is handled outside the model.
Five layers
Section titled “Five layers”- Prompt isolation scans project prompts for tokens or passwords.
- Pre-execution guards verify tenant, enabled tool, identity link, and input fields.
- Network isolation restricts worker egress to approved internal services.
- Tool permissions enforce action scopes, approvals, cooldowns, and per-tool limits.
- Rate limiting and audit logging record every sensitive action with PII filtering.
Auth proxy
Section titled “Auth proxy”The agent never receives backend credentials.
Hermes tool -> internal proxy -> credential vault -> developer APIHIPAA mode
Section titled “HIPAA mode”HIPAA mode applies strict PII filtering, disables conversation history persistence, and adds health disclaimers to health-related replies.
Audit logs should never contain raw access tokens, API keys, or user secrets. See Identity Linking for user resolution.