Skip to main content
Security and trust boundary

Clanker Cloud security and trust boundary

Clanker Cloud is designed so cloud credentials, cluster contexts, and operator control stay on the machine running the app instead of moving into a hosted copilot layer.

The security model is practical: use existing provider access locally, bring your own AI keys, gather live evidence first, review plans second, and only approve execution intentionally.

The core security claim is simple: privilege stays local, evidence is gathered before action, and changes require explicit approval.

Credentials stay local

Use existing cloud accounts, kubeconfig contexts, and repo access from the machine running the app instead of handing them to a hosted SaaS vendor.

Bring your own AI keys

AI provider traffic uses your own keys so teams keep direct provider relationships, pricing control, and model choice.

Local MCP endpoint

Other agents connect to a local MCP surface exposed by the running app rather than a remote control plane.

Review before apply

Read and plan flows come before execution, and maker mode requires explicit operator approval.

Supported providers

Works across the environments teams already run

The current product positioning covers cloud providers, Kubernetes, GitHub, and bring-your-own AI keys from one local operating surface.

Supports ->AWSGCPAzureKubernetesCloudflareHetznerDigitalOceanVercelGitHubBYOK
Boundary map

Where trust stays and where traffic goes

SurfaceWhere it livesWhat it means
Cloud credentials and kubeconfigLocal machineProvider access stays with the operator instead of a hosted copilot vendor.
AI provider keysLocal machineTeams keep direct model billing and provider choice.
Live infrastructure evidenceProvider APIs queried from the local appAnswers and plans are grounded in real environment state.
MCP endpointLocalhost runtimeOther agents connect to the app over a local transport boundary.
Execution approvalOperator in the appChanges require deliberate maker-mode approval.
Security model

What the product is designed to avoid

  • No vendor-managed control plane that needs to permanently store cloud credentials for normal operation.
  • No reseller token layer required for AI model access.
  • No silent background apply step hidden behind a chat response.
  • No requirement to abandon existing provider accounts, repos, or cluster access patterns.
Best fit

Who cares about this boundary most

Teams with real infra

Operators with privileged access

Useful when production access already exists and the priority is faster grounded operations without moving that access to another vendor.

Cautious environments

Organizations that need local control

Helpful when procurement or security review gets harder once a hosted service sits in the middle of privileged workflows.

Agent-heavy workflows

Teams connecting their own agents

The local MCP surface keeps agent integrations close to the operator runtime and existing credentials.

FAQ

Common questions

Do credentials leave the machine?

No. The product positioning is that cloud credentials and cluster contexts stay on the local machine running the app.

Does Clanker Cloud require a hosted control plane for normal operations?

No. The core workflow runs locally and uses the operator’s existing provider access and AI keys.

How do other agents connect safely?

Through the local MCP endpoint exposed by the running app or CLI, so integrations talk to a local transport boundary instead of a remote vendor control plane.

Next step

Need the architecture view?

Read the workflow explainer or the agent-specific page for the operational details behind this trust model.