Documentation Index
Fetch the complete documentation index at: https://docs.svantic.com/llms.txt
Use this file to discover all available pages before exploring further.
Security
Svantic is designed for regulated industries where data sovereignty, auditability, and access control are non-negotiable. This page describes the security architecture from a user’s perspective.Authentication
Every agent authenticates with Svantic using API credentials (Client ID and Client Secret). You obtain these from the dashboard under Settings → API Keys. The SDK handles authentication automatically — provide your credentials and the SDK exchanges them for a short-lived token, then uses that token for all subsequent API calls.Organization Isolation
Each Svantic account is cryptographically isolated:- Agents registered under your account are invisible to other accounts
- Sessions, messages, and knowledge are scoped to your account
- Routing decisions never cross account boundaries
- Even on shared infrastructure, your data is isolated at the authentication layer — not by application logic
Data Sovereignty
Svantic never touches your data. Capabilities execute on your infrastructure — your agents run on your machines, access your databases, and use your credentials locally. Svantic only sees:- Capability names and descriptions (from your agent card)
- Structured results your agent chooses to return
- Session metadata (who’s involved, what state things are in)
Per-Invocation Authentication
Every capability invocation is independently authenticated — not just the connection. Each dispatch carries a short-lived, cryptographically signed token that your agent’s SDK verifies before executing any handler. This means:- Replay attacks are blocked (tokens expire in seconds)
- Each invocation is bound to a specific agent instance
- A compromised callback URL cannot be used to forge requests
Safety Layers
Svantic applies multiple independent safety layers to every operation:| Layer | What It Does |
|---|---|
| Authentication | Verifies agent identity before any operation |
| Invocation Auth | Cryptographically authenticates every capability call |
| Registration Policy | Controls which agent types can operate (open, allow-list, or audit mode) |
| ToolGuard | Gates tool invocations — file access, commands, resource budgets, bulk operations |
| FlowGuard | Prevents runaway execution — step limits, timeouts, cycle detection |
| Approval Workflows | Requires human sign-off for sensitive operations |
| Zero-Knowledge Credentials | Credential values never leave the client machine |
Zero-Knowledge Credentials
When an agent needs to fill in a login form or provide an API key, Svantic uses a zero-knowledge model:- The agent identifies the form field and provides a credential key
- The client tool retrieves the actual value from local secure storage
- The value is used locally — it is never transmitted to Svantic
Compliance
Svantic’s architecture supports compliance with common regulatory frameworks:- SOC 2: Full audit trails, access controls, encryption at rest
- HIPAA: Data never leaves the processing environment
- PCI-DSS: Zero-knowledge credential handling
- GDPR: Organization-scoped data isolation, right to deletion
