Skip to content

Security Overview

Lyco AI is designed for teams that need long-running autonomous workflows with practical security controls and operational visibility.

Data handlingEncryption in transit, scoped workspace access, and strict operator access controls.
InfrastructureContinuous monitoring, centralized logging, and hardened production environments.
Response readinessDocumented incident response workflows with ownership, escalation paths, and post-incident review.

Core controls

  • Role-based access controls and least-privilege defaults.
  • Audit-oriented event logging for sensitive workspace actions.
  • Routine dependency and infrastructure patching cadence.
  • Backups and recovery procedures aligned to service continuity goals.

Model and workflow safety

Autonomous execution is constrained by configurable permissions and review boundaries, so teams can balance speed with control.

Risky actions can be routed through explicit confirmation steps and policy checks before execution.

Responsible disclosure

If you believe you have found a security issue, contact us through the sales form and mark your request as a security report. Include reproduction details, affected scope, and severity.

Submit a security report