Security Overview
Security is foundational to Aigentic. The platform is designed to protect your credentials, audit every action, and give you full visibility into what your agents are doing.
Design Principles
Section titled “Design Principles”- Encrypted credentials — API keys, bot tokens, and all sensitive data are encrypted server-side and never exposed in the browser.
- Isolated execution — Each tenant runs in a dedicated container with per-agent tool permissions.
- Full audit trail — Every agent action, tool invocation, and channel message is logged.
- Zero telemetry — No usage analytics, no tracking, no data collection beyond what you explicitly provide.
- Security dashboard — Automated security posture checks with a visual score.
Security Architecture
Section titled “Security Architecture”┌───────────────────────────────────────────────────┐│ Aigentic Platform ││ ││ ┌──────────┐ ┌──────────┐ ┌─────────────────┐ ││ │ Encrypted │ │ Audit │ │ Bridge Server │ ││ │ Vault │ │ Log │ │ (orchestrator) │ ││ │ (per- │ │ (append- │ │ │ ││ │ tenant) │ │ only) │ │ │ ││ └──────────┘ └──────────┘ └────────┬────────┘ ││ │ ││ ┌─────────────────────────────────────┼────────┐ ││ │ Isolated Per-Tenant Gateways (Docker) │ ││ │ ┌─────────┐ ┌─────────┐ ┌─────────────┐ │ ││ │ │Tenant A │ │Tenant B │ │ Tenant C │ │ ││ │ │(gateway) │ │(gateway) │ │ (gateway) │ │ ││ │ └─────────┘ └─────────┘ └─────────────┘ │ ││ └──────────────────────────────────────────────┘ │└───────────────────────────────────────────────────┘Key Security Features
Section titled “Key Security Features”Credential Encryption
Section titled “Credential Encryption”All sensitive data is encrypted server-side. API keys and bot tokens are never exposed in the browser or transmitted unencrypted. Credentials can be rotated anytime from the console.
Read more about Vault Encryption
Security Dashboard
Section titled “Security Dashboard”The security dashboard provides automated security posture checks with a visual score. It monitors:
- Credential encryption status
- Sandbox configuration
- Audit logging status
- Agent permission levels
Isolated Execution
Section titled “Isolated Execution”Each tenant gets a dedicated gateway container. Agents run in isolated environments with individually configurable tool permissions.
Network Security
Section titled “Network Security”- Zero telemetry — no analytics, no tracking, no phone-home
- API keys are transmitted only to the configured AI provider endpoints over HTTPS
- All connections use TLS encryption
Read more about Network Security
Audit Logging
Section titled “Audit Logging”Every significant action is logged:
- Agent creation, configuration changes
- Tool invocations (with parameters and results)
- Channel messages (sent and received)
- Credential access events
- Scheduled task execution
Best Practices
Section titled “Best Practices”- Use strong, unique passwords for your Aigentic account.
- Enable only the tools each agent needs — Follow the principle of least privilege.
- Review audit logs regularly — Look for unexpected tool invocations or access patterns.
- Disable unnecessary plugins — Disable tools an agent doesn’t need, especially for agents connected to public channels.
- Rotate API keys periodically — Update credentials in the vault when rotating keys with providers.
- Use free models for testing — Develop and refine agents with NVIDIA NIM models before switching to premium providers.