Last updated: February 21, 2026

Security

This page outlines security controls and recommended operating practices for Swarm deployments.

Security approach

Swarm is designed with layered controls across authentication, authorization, execution boundaries, and audit logging.

Customers should map these controls to their internal security standards before enabling broad production access.

Identity and access

User authentication and organization membership determine who can trigger or review runs.

Integration credentials should be scoped to least privilege and rotated according to your security policy.

Execution safeguards

Swarm supports scoped execution controls to reduce repository blast radius and enforce guardrails for automated changes.

Teams should configure approvals, branch protections, and required checks to align with their release process.

Monitoring and auditability

Run timelines and event logs are available for traceability and post-incident analysis.

Monitoring and alerting should be integrated with your existing incident-response workflows.

Vulnerability disclosure

If you discover a vulnerability, report it through your Swarm support channel with enough detail to reproduce safely.

Do not publicly disclose sensitive exploit details until mitigation guidance is available.

Questions about these policies should be routed through your Swarm workspace support channel.