Security Model

Last updated: February 9, 2026

1. Air-gapped by default

Aegis is designed for an on-device-first flow. Conversations, settings, and tool execution can stay entirely local when you use local or on-device models. Network egress is not required for local-only operation.

2. Explicit trust boundaries

Every model source and every tool is explicitly configurable. Tool calling can be turned on or off per source. Built-in tools are visible and auditable, and tool calls are rendered in the chat timeline.

3. Optional cloud delegation

Cloud model usage is opt-in. When enabled, Aegis can apply strict redaction rules before sending prompts off-device.

  • Detect and remove configured sensitive patterns
  • Drop or mask personally identifying fields
  • Constrain outbound context to minimal required scope
  • Disable cloud paths at any time per source

4. Diagnostics policy

Aegis does not automatically upload diagnostics. Debug sharing is manual and user-initiated. The app presents share/export actions explicitly so you can decide whether to send diagnostic payloads.

If you do not share diagnostics, they remain local to your device storage.

5. Configuration portability

Settings are exportable/importable as versioned JSON for reproducible deployments and audits. This includes models, tool definitions, and source-level capability toggles.

Operational note

When you intentionally enable cloud providers, remote provider data handling applies to the content you choose to send after redaction. Keep strict mode enabled for privacy-sensitive workflows.