unbounded writes
Agents writing where they should not
Path scope is declared in the approval contract. Anything outside the declared scope is treated as out of bounds and rejected at validation time, before any write.
Security posture
Latchpoint is built with least-privilege intent, conservative defaults, and an emphasis on auditable behavior. Scope stays intentionally narrow and is declared in the approval contract. This page describes the actual posture in plain terms, including what it does not address.
Defended against
unbounded writes
Path scope is declared in the approval contract. Anything outside the declared scope is treated as out of bounds and rejected at validation time, before any write.
partial writes
Approved changes are applied using atomic file replacement with post-write verification. A failed step rolls back cleanly instead of leaving partial writes behind.
silent failure
Every proposal, validation result, approval, block, and write produces a recorded artifact. Failed and blocked changes are recorded honestly alongside successful ones.
implicit rules
Scope, permissions, and operating limits are declared in the approval contract rather than in agent instructions. Validation checks the contract, which is inspectable, instead of trusting that the prompt was followed.
Not claimed
Stated explicitly so the system is not asked to do things it was not built to do.
Operational discipline
least privilege
Repository permissions stay narrow by default. The integration requests only what is needed to operate the control layer, and the scope is declared in the approval contract.
no payload dumps
Operational telemetry records event types and identifiers, not full webhook payloads. Repository identifiers appear as short, de-identified references.
no token exposure
GitHub tokens and auth headers are excluded from logs and from any debug output. Secrets live in runtime secret management, not in source control.
audit by default
The audit trail is part of the same code path that validates and applies a change, not a separate logging layer running alongside it. Approvals, blocks, and rollbacks all leave records in the same place.
Access
Admins can remove integration access from their GitHub settings at any time. Removal is immediate and does not require coordination with Latchpoint to take effect. There is no offboarding flow to wait on; revocation is in the admin's hands.
Reporting
If you believe you have found a security issue, please review our responsible disclosure policy for guidance on what to report and how reports are handled.