🌐

Public vs. Permissioned Review

Cliphorium can review public website risk signals without login — pages, headers, common routes, sitemap, robots, and visible customer paths. Deeper review of backend, admin, hosting, CRM, billing, support, or monitoring tools requires written permission and connected access.

📋

Report-Only by Default

Agents start in report-only mode — they observe, summarize, and draft. No live write or send action occurs until you explicitly approve the output. Your operations stay visible before they become actions.

🔐

Approval-First Workflows

Every workflow output sits in an approval queue. Agents cannot bypass the gate. You review the draft, context, and risk summary — then decide. Approved, rejected, or revision-requested actions are all logged.

🚫

No Silent Production Changes

Cliphorium agents do not autonomously modify production systems. If a fix or update is recommended, it is staged as a plan and surfaced for your review. Your production environment requires your sign-off.

🛡️

Scoped Access

Each agent is granted the minimum access required for its defined workflow. Read access is separated from write access. Agents cannot escalate their own permissions or reach systems outside their configured scope.

🗂️

Audit Trail

Every agent action, approval decision, and workflow event is written to a structured audit log. You or your decision maker can review the full history of what was seen, drafted, approved, and executed.

🔑

Credential Handling

Credentials, API keys, and tokens required for connected tools are handled through scoped secrets, read-only access where possible, and customer-specific configuration. They are not intentionally exposed in public pages, logs, or shared across customer contexts. Cliphorium does not need your personal passwords.

🔎

Security & Risk Review

For Managed Agent Ops, scheduled read-only checks of the connected scope can surface unusual public signals, broken paths, exposed pages, or risky workflow steps. Findings are delivered as a draft report — nothing is remediated until you review and approve.

🧩

Context Isolation

Customer contexts are designed to stay separate across deployments. Agent workflows, data, credentials, and audit trails are scoped to each customer environment so work from one deployment is not mixed with another.

Escalation Routing

High-risk flags or ambiguous scenarios are escalated to the designated decision maker. Agents do not resolve uncertainty by acting — they surface it for human judgment first.

⚖️

What We Do Not Promise

Cliphorium does not stop attackers, replace your security stack, or guarantee that every issue will be detected. We help you watch, surface, summarize, and prepare approved next steps. Final responsibility for connected systems stays with the owner.

Security Questions?

If you have specific security requirements, compliance questions, or want a scoping session for your stack, book a free audit call. We review your environment and the tools you want connected before any agent is deployed.

Book Security Scoping Call