Your account, your control
Zac can read settings, build plans, and execute changes across your entire Zoom environment. That's powerful — and it means security can't be an afterthought.
Nothing changes without your approval
Every configuration change passes through a four-layer approval chain before it touches your Zoom account.
Layer 1
LLM Prompt Rules
System-level instructions prevent the AI from executing changes autonomously. Every write action requires explicit user confirmation.
Layer 2
Preview & Confirm
Before any write, Zac shows you exactly what will change. You receive a single-use confirmation token to approve the action.
Layer 3
Backend Validation
The server rejects any write request that lacks a valid confirmation token. Tokens expire after 5 minutes and cannot be reused.
Layer 4
Database Constraint
The audit log table requires a foreign-key reference to a valid confirmation record. Changes without proof of consent cannot be stored.
Chain of Evidence
Your credentials never touch our database in plain text
Zoom OAuth tokens are encrypted at rest with AES-256-GCM and wrapped with a per-workspace key derived via scrypt.
How we encrypt
- AES-256-GCM authenticated encryption for all credentials
- Unique key per workspace derived via scrypt KDF
- Master key stored in infrastructure secrets manager, never in code
- Random 16-byte IV generated per encryption operation
- TLS 1.2+ for all data in transit
When you disconnect
Cryptographic erasure ensures your data becomes permanently unrecoverable.
- 1 OAuth tokens revoked at Zoom
- 2 Workspace encryption key permanently deleted
- 3 Encrypted data becomes unrecoverable (no key = no data)
- 4 Credential records deleted from database
- 5 Disconnection event logged to audit trail
Read-only by default. Write access only when you ask.
Zac requests the minimum OAuth scopes needed. Write permissions are only added when you explicitly choose to make changes.
Tier 1: Read-Only
Granted on connect
- Account settings & plan details
- User list & license assignments
- Feature configuration state
- Admin audit logs
Tier 2: Write on Request
Only when you ask
- Modify account settings
- Create & update groups
- Enable & disable features
- Manage call routing
We Never Access
Not requested, ever
- Meeting content or recordings
- Chat messages or files
- Call recordings or voicemails
- Meeting passwords
One-click kill switch
Revoke all Zac access instantly from your Settings page or directly from the Zoom Marketplace. Tokens are revoked immediately and cryptographic erasure begins.
Your data stays out of the AI
We strip personally identifiable information before any data reaches the language model, and we defend against every known prompt injection technique.
PII pseudonymization
Real names, emails, and IDs are replaced with opaque tokens before reaching the AI. The mapping is held server-side and reversed only in the response.
Before (your data)
alice@acme.com After (sent to AI)
user_1@example.com Prompt injection defense
Zac is tested against the full OWASP LLM Top 10 threat catalog. Every known injection vector is blocked at the input layer before reaching the model.
0%
Attack success rate
100%
OWASP LLM Top 10 pass
What the AI cannot do
No autonomous actions
The AI cannot execute changes to your Zoom account without going through the 4-layer approval chain.
No cross-tenant access
Each workspace is cryptographically isolated. The AI cannot read or reference data from other customers.
No system instruction disclosure
Prompt injection attempts to extract system instructions are detected and blocked at the input layer.
Every action logged, every change traceable
The audit trail captures every interaction with your Zoom account, creating an immutable record of who did what, when, and why.
What's recorded
- Who — the admin user who initiated and confirmed
- What — the setting changed, with before & after values
- When — timestamp with millisecond precision
- Confirmation token — proof of user consent
- Zoom API request ID — correlates to Zoom's own audit trail
Why this matters
- Compliance proof — demonstrate to auditors exactly what changed and who approved it
- Rollback context — before/after values let you revert any change with confidence
- Separation of concerns — clearly distinguish Zac-made changes from manual admin activity
- Exportable logs — download your full audit history as CSV or JSON at any time
Standards & certifications
Zac is built to meet the security requirements of enterprise Zoom deployments.
SOC 2 Type II
In progressTrust services criteria for security, availability, and confidentiality. Audit observation period underway.
OWASP Top 10
CompliantProtected against all OWASP Top 10 web application security risks including injection, broken auth, and XSS.
OWASP LLM Top 10
Compliant33 tests covering all LLM-specific threats. 100% pass rate across prompt injection, data leakage, and insecure output handling.
GDPR
CompliantCryptographic erasure on disconnect, data minimization by design, and Data Processing Agreement available on request.
Zoom Marketplace
ApprovedPassed Zoom's security review process for Marketplace-listed applications, including OAuth scope audit and data handling review.
Webhook Security
HMAC-SHA256All incoming webhooks are verified with HMAC-SHA256 signatures. Replay attacks are prevented with timestamp validation.
Questions about security?
We're happy to answer questions, provide our security documentation, or schedule a call with our engineering team.