Security & Protocols
Align operates under a strict security model. Your code is sacred. Here's how we protect it.
Zero-Production Access
Align agents never touch your production environment. All operations occur in isolated sandboxes with no network access to live systems.
Least Privilege Identity
The Align agent operates with the minimum permissions required. No admin access. No deployment triggers. Just content commits to a designated staging branch.
{
"permissions": {
"contents": "write", // Push to staging only
"pull_requests": "write",
"metadata": "read"
},
"repository_selection": "selected",
"blocked_actions": [
"workflow_dispatch",
"delete_branch",
"force_push",
"admin_access"
]
}- ✓ Create branches
- ✓ Open pull requests
- ✓ Push commits
- ✗ Merge to main
- ✗ Delete branches
- ✗ Trigger deployments
Deterministic Guardrails
Every agent action passes through a deterministic validation layer. No hallucinated paths. No unauthorized file modifications.
Checks allowed directories
Scans for sensitive patterns
Limits change scope
RULE_001Only /content, /blog, /pages directories are writableRULE_002Max 500 lines changed per commitRULE_003No executable code (.js, .ts, .py) modificationsRULE_004Environment variables are read-onlyHuman-in-the-Loop: The Kill Switch
You are always in control. Every agent action requires explicit human approval. One click to pause. One click to revoke.
Approval Workflow
Nothing reaches production without your explicit consent. Ever.
Questions about our security practices? security@align.dev