Guardrails & Safety
Guardrails define the boundaries of your agent’s autonomous behavior. Your Hubify workspace runs 24/7, accesses tools, communicates on your behalf, and executes workflows without your constant supervision. Guardrails ensure it does all of this within limits you control.Draft-Only Mode
Draft-only mode is the most important safety mechanism in Hubify. When enabled for an integration, your agent creates drafts for all external communications but does not send them automatically. You review each draft, edit if needed, and approve before anything goes out.How It Works
Agent creates a draft
When your agent needs to send an email, post on LinkedIn, or message a client, it writes the content and saves it as a draft in your workspace.
You get notified
A notification appears in your dashboard (and optionally via Telegram or Slack) that a draft is ready for review.
You review and edit
Open the draft, make any changes, and decide whether to approve, edit, or discard it.
Configuring Per-Integration
Draft-only mode is configured per integration in yourHUB.yaml:
Default Behavior by Template
| Template | Draft-Only Channels | Auto Channels |
|---|---|---|
| Founder OS | LinkedIn, Twitter, Gmail | Telegram, GitHub |
| Client OS | Client email, deliverables | Internal Slack |
| MyOS | None by default (user configures) | All |
| Dev OS | None by default | GitHub, Slack |
Action Approval Workflows
Beyond draft-only mode for communications, Hubify supports approval gates for high-impact actions — operations where a mistake could be costly or irreversible. Examples of actions that benefit from approval gates:| Action | Risk Level | Recommended Mode |
|---|---|---|
| Sending an email to a client | Medium | Draft-only |
| Posting on social media | Medium | Draft-only |
| Deploying code to production | High | Manual approval |
| Modifying infrastructure | High | Manual approval |
| Processing a payment | High | Manual approval |
| Deleting data | High | Manual approval |
| Publishing a skill to the registry | Medium | Draft / review |
Fine-grained approval gates for specific action types (deploy, billing, infrastructure changes) are planned. For now, use AGENTS.md instructions to tell your agent which actions require your explicit sign-off.
Workaround: AGENTS.md Instructions
Until granular approval workflows ship, you can define action-level guardrails in yourAGENTS.md:
Scope Limits
API Token Scopes
When connecting integrations, use the principle of least privilege. Grant your agent only the permissions it needs for its specific tasks.| Integration | Recommended Scopes | Avoid |
|---|---|---|
| GitHub | repo:read, pull_request:write, issues:write | admin:org, delete_repo |
| Slack | chat:write, channels:read | admin, users:write |
| Gmail | gmail.compose, gmail.readonly | gmail.settings.basic |
Always use scoped API tokens rather than admin tokens. If your agent only needs to read repositories and create pull requests, do not give it organization admin access.
Vault Access Control
The Hubify vault stores encrypted credentials. You control which agents and which workspaces can access specific vault entries.Per-Agent Permissions
Different agents in your workspace can have different permission levels:| Agent | Role | Permissions |
|---|---|---|
| Cloud orchestrator | Orchestrator | Full access to all integrations and vault |
| Local coding agent | Builder | GitHub only, no communication channels |
| Automation agent | Automation | Read-only access, notification channels only |
Safety Best Practices
Follow these guidelines to keep your workspace secure while maximizing your agent’s autonomy.Start with draft-only mode for all external communications
Enable draft-only for LinkedIn, Twitter, Gmail, and any channel where your agent speaks on your behalf. Switch to auto only after you’ve reviewed enough drafts to trust the output.
Use scoped API tokens
Never give your agent admin-level tokens. Create service-specific tokens with the minimum permissions needed. If a token is compromised, the blast radius is limited.
Enable 2FA on your Hubify account
Your workspace has access to your integrations, vault, and agent actions. Protect the account with two-factor authentication.
Review vault access logs regularly
Check which agents accessed which credentials and when. Unexpected access patterns may indicate misconfiguration or a compromised agent token.
Keep sensitive operations in manual-approval mode
Deployments, billing actions, infrastructure changes, and data deletion should always require your explicit sign-off. Define these in AGENTS.md until granular approval gates ship.
Security Architecture
Hubify’s security model is built on multiple layers:| Layer | Protection |
|---|---|
| Workspace isolation | Each workspace runs on its own Fly.io machine with no shared filesystem |
| Vault encryption | AES-256 encryption for all credentials; Hubify never stores decryption keys |
| Scoped tokens | Agents receive short-lived, scoped tokens — never raw credentials |
| 5-Gate Trust Gateway | All skills pass through schema validation, provenance checks, content scanning, reputation checks, and E2B sandbox testing before installation |
| Audit logging | All vault access and agent actions are logged |
| SSL/HTTPS | Automatic SSL via Let’s Encrypt on all *.hubify.com subdomains |
Next Steps
Customizing Templates
Edit personality, skills, model routing, and integrations
Hub Files & Structure
Understand every file in your workspace and how agents use them
Trust Metrics
How the 5-Gate Trust Gateway protects your workspace
Workspace Isolation
How workspaces are isolated from each other