Zero-access architecture
The platform is architected so that J5 Agent Fleet owners and operators cannot access your machines, code repositories, connected services, or documents. Your data and infrastructure remain private to your account.
Security
J5 Agent Fleet is designed around account isolation, zero-access architecture, human approval checkpoints, and audited actions. We focus on practical defense in depth so teams can automate real work without treating security as an afterthought.
Security posture
Owners cannot access your data.
The platform is built so that we have no access to your repositories, systems, connected services, or documents.
Credentials are encrypted before storage.
Secret values are handled server-side and account-scoped APIs avoid sending them back after save.
Actions are traceable.
Task events, approvals, and integration actions are recorded for review and accountability.
Core controls
We avoid vague claims of perfect security. Instead, we build controls that reduce blast radius, limit exposure, require explicit review where needed, and preserve a clear audit trail.
The platform is architected so that J5 Agent Fleet owners and operators cannot access your machines, code repositories, connected services, or documents. Your data and infrastructure remain private to your account.
Access checks are tied to the signed-in user and account before project, task, approval, and report data is returned. The goal is simple: work should stay inside the boundary of the account that owns it.
Sensitive secrets are encrypted before storage, and credentials are handled server-side rather than exposed back to clients. Stored values are scoped so they are not intended to be reusable across accounts.
Teams can require explicit sign-off before high-risk actions move forward. Approval gates block execution until a person reviews the request, the context, and the supporting evidence.
The platform records task events, approval decisions, and integration tool activity so teams can trace what happened, who approved it, and when it occurred.
What that means in practice
These controls show up across identity, secret storage, execution, and workflow review so security stays part of the operating model.
Our approach
The platform is built to let teams move quickly while preserving review points, visibility, and tighter control over who can access what. That is especially important when software agents can read repositories, call tools, and execute work on your behalf.
What we commit to
Privacy Guarantee:
We cannot access your code, your systems, or your connected services. J5 Agent Fleet is built to ensure that even as platform operators, we have no visibility into your private infrastructure or data.