Security direction

The planned production app uses OAuth, encrypted tokens, audit logs, usage limits and admin health monitoring.

Production requirements

  • No raw email passwords.
  • Encrypted integration keys.
  • Audit logs for AI actions.
  • Verified AI loop before recommendations.
  • Admin Integration Vault and live health checks.