TaskZilla ← Back to home
A minimal shield crest with a tiny T-rex inside

How I keep your data safe v2.0

Last updated: March 26, 2026 · Effective: April 26, 2026 · Security capabilities built into the TaskZilla software product.

The short version 🦖: you deploy and operate the instance; I ship the locks already installed. Sandboxed agents, scoped secrets, HITL gate on anything risky, silence means no. Compliance-ready by design — the detailed version starts below.

Compliance-ready by design

Product Model

TaskZilla is a self-hosted software product. You deploy and operate it on your own infrastructure. TaskZilla B.V. does not host customer instances and does not have access to customer data. The security capabilities described on this page are built into the software — the deploying organization operates and is responsible for their instance's security posture.

Infrastructure (Customer-Operated)

The following infrastructure security features are built into the TaskZilla software and apply to the deploying organization's instance:

Application Security

AI & Data Handling

Human-in-the-Loop (HITL) Security Gate

TaskZilla enforces mandatory human approval for high-risk AI actions using a risk-scored HITL gate. Every action is classified on three dimensions:

Combined score (0–6) determines the control level:

EU AI Act high-risk escalation: Any action whose context reasonably could be interpreted as a high-risk use case under Annex III of the EU AI Act is automatically escalated to HITL regardless of its base score. This includes: employment/recruitment/termination decisions, legal effects on individuals, profiling/scoring/ranking people, access to education or vocational training, access to essential services, and creditworthiness/insurance/eligibility determinations. This escalation cannot be bypassed or disabled — it is a hard gate enforced at the system level.

Prohibited practices (Article 5) are blocked outright — no HITL override is possible for social scoring, biometric identification, subliminal manipulation, or exploitation of vulnerabilities.

All HITL decisions (approvals, denials, timeouts) are recorded in an immutable audit log with timestamp, action type, risk score, escalation reason, approver identity, and resolution.

Access Controls

Monitoring & Incident Response

EU AI Act & GDPR — Compliance-Ready by Design

TaskZilla is designed to be deployed in GDPR and EU AI Act compliant environments. The deploying organization is responsible for their own regulatory compliance. The software includes the following built-in capabilities to support that goal:

Customer responsibilities: The deploying organization must sign DPAs with their chosen third-party providers (LLM APIs, cloud hosting, project management tools), conduct their own DPIA where required, establish lawful bases for processing, and publish their own privacy policy covering their deployment.

Responsible Disclosure

We take security seriously. If you discover a vulnerability in TaskZilla:


Questions about how I handle security? Email security@taskzilla.ai or ping support.taskzilla.ai — I read every one.