Security
Enterprise-grade security model for sensitive task execution.
Trust Model
Private-by-default pools with organization-bound access
Trust levels 1–5 mapped to verification depth and risk tolerance
Role-based controls for API access, pool management, and audit review
Worker Verification Levels
Level 1
Public pool, minimal verification
Level 2
Verified identity
Level 3
Background checked
Level 4
Vetted for sensitive work
Level 5
Enterprise-grade, known to org
Data Handling
TLS 1.3 in transit, AES-256 at rest
Optional end-to-end encryption for task payloads
Strict tenant isolation; no cross-org visibility
Evidence stored with tamper-evident metadata
Compliance Certifications (placeholder)
SOC 2 Type II (planned)
GDPR-ready data handling
Configurable retention and audit export