AmpGate is a security product. Here is exactly how we protect your data and your customers' data.
Every Agent Task Token (ATT) is signed with an Ed25519 private key generated on first boot and stored with filesystem permission 600. Ed25519 produces 64-byte signatures, is resistant to timing attacks, and is significantly faster and smaller than RSA-2048 or ECDSA. The corresponding public key is exposed at /.well-known/jwks.json so any service in your infrastructure can independently verify tokens without calling home.
The audit log is hash-chained. Every event includes the SHA-256 hash of the previous event, so a deleted or modified event breaks the chain. The GET /v1/audit/verify-chain endpoint recomputes the full chain and identifies the first broken link if tampering is detected. This provides cryptographic evidence of log integrity for compliance audits.
Every token carries a nonce stored in Redis at issuance. Revoking a token writes to Redis immediately — verification fails within milliseconds. The cryptographic JWT expiry is a backstop; Redis revocation is the primary control. This means a compromised token can be stopped in real time, not just when it expires.
secrets.randbelow()Found a vulnerability? Email security@ampgate.io. We will respond within 48 hours and coordinate disclosure responsibly.