About
v1 uses Entra ID sign-in and a strict tenant allow-list. Access is isolated per tenant. Early modules run read-only operations first, then expand into controlled deployment workflows.
Tenant isolation
Tenant context is derived from Graph organization data and validated against an allow-list. Cross-tenant data access is blocked by design.
Safety
Guardrails come first. Destructive actions will require explicit confirmation and auditing.
Get started