Security Built for the AI Era
Governed Access. Governed Execution. Enterprise Trust.
ThreadSync secures both AI access and AI execution with enterprise-grade controls, audit trails, and defined boundaries at every layer.
LLM Gateway Security
Every model request passes through policy enforcement, rate controls, and audit logging before reaching a provider. No raw credentials leave your perimeter.
Governed Model Access Controls
- Org-scoped API keys with provider and model allowlists
- Per-key team assignment with granular permissions
- SHA-256 key hashing — no raw key persistence
- Error sanitization preventing credential leakage in responses
Rate Limiting & Budget Controls
- Atomic slot reservation for concurrent request limits
- Hourly sliding-window rate enforcement per key
- Daily and monthly budget caps per key and per team
- Per-request cost tracking with real-time spend visibility
Browser-Safe PKCE Sessions
- PKCE flow with signed proof-of-possession tokens
- No long-lived secrets exposed to browser contexts
- Session-scoped access with automatic expiry
- Origin-bound token validation prevents replay attacks
Audit Logging
- Every request logged: key, model, provider, tokens, cost
- Structured JSON audit records for SIEM ingestion
- Error events captured without leaking sensitive payloads
- Immutable log storage with configurable retention
Magic Runtime Security
AI-generated code executes inside sandboxed environments with capability-based permissions, contract enforcement, and hash-chained audit logs.
Sandboxed Execution Environments
- Process isolation via cgroups and seccomp profiles
- Read-only root filesystems with scoped writable layers
- Network egress restricted to declared endpoints
- Resource limits (CPU, memory, wall-clock) per execution
Capability-Based Permissions
- Default-deny permission model — nothing runs without a grant
- Declared inputs, outputs, and permissions per contract
- Fine-grained capabilities: filesystem, network, secrets access
- Permission escalation requires explicit operator approval
Contract Enforcement
- Every execution declares expected inputs, outputs, and side effects
- Runtime validates contract compliance before and after execution
- Deterministic errors via structured error catalog — no opaque failures
- Contract violations terminate execution and trigger alerts
Immutable Audit Logs
- SHA-256 hash-chained log entries — tamper-evident by design
- Full execution trace: inputs, outputs, permissions used, duration
- Exportable to compliance and SIEM systems
- Retention policies configurable per organization
Platform Security
The infrastructure beneath LLM Gateway and Magic Runtime is hardened at every layer.
Encryption
- AES-256-GCM encryption at rest for all stored data
- TLS 1.3 enforced for all data in transit
- Customer-managed keys (BYOK) available on Enterprise plans
- Automatic key rotation on configurable schedules
Identity & Access
- SAML 2.0 and OIDC single sign-on
- Role-based access control (RBAC) with least-privilege defaults
- Multi-factor authentication enforced for all accounts
- IP allowlisting and session timeout policies
Network & Infrastructure
- Container hardening with read-only filesystems
- Private networking with strict ingress/egress rules
- Immutable infrastructure deployments — no SSH to production
- Automated vulnerability scanning on every build
Monitoring & Observability
- 24/7 monitoring with anomaly detection and alerting
- Wallace observability integration for correlated telemetry
- Distributed tracing across Gateway, Runtime, and infrastructure
- Incident response with defined severity levels and escalation
Defense in Depth
Multiple security layers ensure no single point of failure from edge to execution.
Compliance & Trust
ThreadSync maintains security controls aligned with industry standards and provides transparency into our security posture.
SOC 2 Aligned Controls
- Controls mapped to SOC 2 Type II Trust Service Criteria
- Annual third-party penetration testing
- Pre-filled CAIQ, SIG Lite, and custom security questionnaires
- Data residency options (US/EU)
Transparency
- Subprocessors listed with data-flow descriptions
- Responsible disclosure program for security researchers
- Trust Center with live status and control documentation
- Security package with architecture diagrams available under NDA
Security FAQ
Common questions from security and compliance teams.
Ready to Evaluate Our Security Posture?
Get our comprehensive security package, schedule an architecture review, or explore our Trust Center for live documentation.
Security package available under NDA for qualified enterprise prospects
