← Back

Security
for approval workflows.

How we protect workflow history, approval evidence, and operational access.

Application controls

  • Traffic is served over HTTPS with access controls around authenticated product surfaces.
  • Review requests are tied to explicit workflow objects instead of loose chat threads.
  • Approved snapshots and version history create a clearer record of what was shown and when.

Workflow and model controls

  • Different model families may be routed to different tasks such as drafting, critique, and guard checks.
  • Guard models and workflow checks can flag claims, prohibited phrases, missing requirements, and off-brief drift.
  • Customer content is not used to fine-tune centralized foundation models.

Reporting

  • To report a potential security issue, contact support@narraplex.com.
  • Please include reproduction details, affected URLs, and any timeline constraints when possible.