What It Does
Monk handles security at two levels:- Agentic Security — keeps the AI agent itself safe to use
- Runtime Security — protects your deployed apps and infrastructure
Agentic Security
Monk is an autonomous agent with real privileges. It provisions infrastructure, changes configs, and manages production. That demands safety mechanisms you won’t find in typical AI tools.Secrets Never Reach the LLM
Credentials are encrypted at rest in your IDE’s secret storage and on your Monk cluster using your cloud provider’s KMS. They are never sent to Monk servers and never exposed to the LLM. How it works:- Secrets are handled by deterministic tooling, not AI inference
- The LLM only knows a secret exists — it never sees the value
- Secret values are never generated by the LLM
Secrets Never Leave Your Infrastructure
Where secrets live:- Workspace/user scope — your IDE’s secret storage, encrypted at rest by OS toolchain (macOS Keychain, Windows Credential Manager, Linux Secret Service)
- Team scope — on your org cluster, envelope-encrypted with your cloud provider’s KMS
- Never — Monk servers
Destructive Actions Require Approval
Monk can’t silently destroy things. Destructive actions are gated by tooling, not by AI judgment. When Monk needs to delete resources, it tells you exactly what’s affected. You approve or reject. The approval flow is handled by tooling — the AI can’t be manipulated to bypass it. Protected actions include:- Deleting infrastructure resources
- Removing databases or storage
- Tearing down production environments
- Reducing security group access
Blast Radius Awareness
Monk understands what depends on what. Before making changes, it knows:- Which services break if you delete a database
- Which users see downtime if you change a domain
- Which services are affected by a security group change
Restricted Capabilities
Monk operates within hard boundaries. What Monk CAN do:- Generate and edit Containerfiles, Monk configurations
- Provision cloud resources via provider APIs
- Configure services via orchestrator APIs
- Read code in your open workspace
- Execute arbitrary CLI commands on your machine
- Make arbitrary API calls outside its tooling
- Access files outside your open IDE workspace
- Bypass approval requirements for destructive actions
Deterministic Validation
Every LLM response is validated before execution:- LLM generates a plan and tool calls
- Deterministic code validates the plan
- Validation checks parameters, operation safety, and resource types
- Only after validation do actions execute
Runtime Security
Once your app is deployed, Monk locks it down automatically.Secret Storage and Management
Credentials are encrypted at rest in your IDE’s secret storage and on your Monk cluster using your cloud provider’s KMS. They are never sent to Monk servers and never exposed to the LLM. At runtime:- Secrets are injected into containers at runtime, never baked into images
- Team secrets are environment-scoped — staging and production get separate values
- Secrets are never logged or exposed in configurations
Encrypted Networking and Segmentation
All service-to-service communication is encrypted by default. Monk’s overlay network spans all your infrastructure — no manual VPN or WireGuard setup. Traffic is segmented automatically:- Services only communicate if your connection graph says they should
- Lateral movement is prevented by default
- See Networking for the full picture
VM and Access Control
VMs don’t expose SSH ports. You manage infrastructure through Monk’s orchestrator API from your IDE. All management actions are authenticated and encrypted.Automatic Firewall Management
Only the ports you need are open:- Public-facing services expose application ports (80, 443)
- Internal services have no public ports
- Inter-service communication stays on the private network
- Everything else is blocked
Container Security
When Monk generates Containerfiles (see Containerization), it follows security best practices:- Non-root users in containers
- Minimal base images (Alpine, distroless)
- No unnecessary packages
- Multi-stage builds to minimize attack surface
Automatic IP Whitelisting
When your containers connect to external services, Monk handles IP whitelisting for you. Example: your container connects to MongoDB Atlas. Monk knows the VM’s IP, calls the Atlas API to whitelist it, and updates the whitelist automatically if the container moves. Same for Redis Cloud, managed databases, and any service that supports IP-based access control.Airgapped and Enclosed Deployment
Enclosed VPC: Run entirely within your VPC with no internet access required (except for external APIs your app needs). Manual setup required. Airgapped on-premises: Run completely disconnected from the internet with all management over your local network. Manual setup required. See Getting Help for guidance on airgapped deployments.Ingress WAF
Monk’s ingress controller includes ModSecurity WAF on all clusters by default. See Networking for details.Networking
Encrypted overlay network, firewalls, and ingress configuration.
Configuration & Wiring
Secret management, injection, and environment wiring.

