⌘K
Env:
JD

Security

Policies, secrets, auth scopes and audit logs

12

Active Policies

8

API Keys

2

Risk Signals

100%

Compliance

Security Policies

Input Validation

schema · 24 rules

active

Rate Limiting

traffic · 8 rules

active

Secret Rotation

ops · 12 rules

active

Access Control

auth · 6 rules

warning

Audit Log

policy.created
system2h ago
api_key.rotated
admin5h ago
secret.updated
system1d ago
access.granted
admin2d ago