Security and Compliance
Tenant isolation, sandboxing, audit trails, and compliance readiness.
Tenant and org isolation
Tenant and org boundaries are resolved through the canonical bootstrap and policy layers. Marketplace visibility, access objects, and release channels do not bypass tenant controls.
WorkOS provides the identity and org signals. NOME enforces the isolation boundaries at every service layer: platform, gateway, spine, and client.
Tool sandboxing and risk classification
NOME uses AST-based shell command parsing for risk classification — structurally evaluating commands before execution instead of relying on string matching.
Tools are classified into risk tiers (read/write/danger). Dangerous operations trigger approval workflows. The tool policy matrix defines governance per tool.
File permission gateways
The file permission system operates on cascading configuration with strict precedence. The most restrictive protection level wins when multiple rules match.
noAccess blocks all operations on sensitive files (.env, keys, credentials). readOnly permits inspection but blocks modifications. Hardcoded rules ensure the system fails safe.
Audit trails vs telemetry separation
NOME explicitly separates audit/compliance trails from product telemetry. Evidence, approvals, and run receipts serve compliance review. Telemetry and eval traces serve product improvement.
This separation is a structural rule, not a policy preference. Merging these streams would compromise both compliance integrity and experimentation freedom.
Encrypted persistence and key management
Connector OAuth tokens and sensitive platform state use encrypted token persistence through the platform's secret records infrastructure.
SCIM bearer tokens are stored only as hashes. Key rotation is available through the control plane without backend surgery.
Compliance and evidence generation
Every NOME run produces receipts, tool call logs, approval records, and artifact references. These constitute the evidence chain for compliance review.
The evidence pass and run receipt system is designed for SOC2, HIPAA, and dedicated VPC deployment security reviews.
Ready to try it?
Open NOME