Security & Compliance
AME touches production logs and source code. We treat every byte that way — encrypted in transit and at rest, isolated per-run, fully audited.
Encryption
TLS 1.2+ in transit. AES-256 at rest in AWS-managed KMS. Integration credentials are encrypted with a per-workspace key.
Isolation
Every remediation runs in a fresh, single-use sandbox. Source code is cloned, used, and destroyed without persisting to disk beyond the run.
Auditability
Every agent step is recorded with timestamps, prompts, tool calls, and outputs. PRs are signed and tagged to the originating incident ID.
How AME is built to fail safely.
Network
VPC isolation in AWS, private subnets for application workloads, no public ingress to databases. Outbound calls to LLM providers and your VCS happen from a tightly scoped egress NAT.
WAF rules block common OWASP attacks; rate limits apply per workspace and per route.
Secrets
GitHub / GitLab / Jira tokens, LLM API keys, and Context7 keys are stored encrypted with envelope encryption (AWS KMS). Decryption is gated by IAM and scoped to the workspace's runtime principal.
Secrets never leave our VPC and are not exposed to the agent's tool-calling surface unless the action explicitly requires them.
Agent runtime
OpenHands runs the remediation in a single-use Linux sandbox with no public network access except to the LLM endpoint and your VCS. No persistent volume; the sandbox is destroyed at the end of the run.
The agent cannot push to main / protected branches. It opens a PR, period.
Access & identity
SSO with SAML for Professional and Enterprise. MFA is enforced for all CanyonTechs personnel on production systems. Least-privilege IAM roles, short-lived credentials, and full audit logging via CloudTrail.
RBAC inside the console: superadmin, admin, member, viewer.
Monitoring & response
Centralized logs, metrics, and traces with 24/7 alerting. Anomalies on the auth or PR-opening paths page on-call within 5 minutes. Security incidents follow a documented runbook with disclosure SLAs.
Responsible disclosure
Found a vulnerability? Report it to security@canyontechs.ai. We acknowledge within 1 business day, validate within 5, and patch critical issues within 14 days.
Email security arrow_forwardDocuments on request
- check_circle SOC 2 Type II report (NDA)
- check_circle Sub-processor list
- check_circle Data Processing Addendum (DPA)
- check_circle Security questionnaire (SIG / CAIQ)
Common security questions.
Do you train models on my code? expand_more
Can AME be self-hosted? expand_more
Where is data stored? expand_more
us-east-1 (AWS, N. Virginia). EU customers can opt into eu-central-1 at workspace creation. Enterprise customers can pin to any AWS region we operate in, including FedRAMP-eligible regions on request.