Governance
Click to enlarge
Compliance overview
How Conflux detects, sanitizes, blocks, or reroutes risky content.
Click to enlargeModes
Built-in protection
Built-in domains detect secrets, API keys, bearer tokens, private keys, database URLs, private infrastructure, PII, finance identifiers, HR/legal markers, and destructive operations such as DROP TABLE, rm -rf, kubectl delete, terraform destroy, and unsafe mass SQL operations.
Custom rules
Workspace teams can add custom regex or keyword rules for internal identifiers, project-specific terms, regulated records, or customer formats. Custom rules should be precise to avoid false positives.