Safe to run in your Snowflake account by default.
Outbound traffic is deny-by-default. Credentials never reach the model. Config files are root-owned and read-only at runtime. The agent runs under a dedicated service role with minimal privileges.
- Network egress control — only approved hosts get Snowflake network rules.
- Secret masking — the Cortex proxy scrubs known secrets from every outbound LLM message.
- Role separation — admin role deploys infra; the container runs under a least-privileged service role.
- Config lockdown — the agent can't modify its own config or credentials.