Security & Compliance

Operational controls used to protect data and service integrity.

Core Controls

Encryption in transit and at rest for production data paths.

Scoped service access with least-privilege role design.

Structured logging, audit trail capture, and incident alerting.

Application Safeguards

Rate limiting, token budgets, execution timeouts, and kill switch support.

Prompt injection guardrails and tool permission gating.

Vulnerability Reporting

Report potential vulnerabilities to security@twinoai.com.

Last updated: March 4, 2026