Tool Permissions Overview
Every tool in ZeroTwo requires specific permissions to function. Understanding these permissions helps you make informed decisions about which tools to enable and what data they can access.ZeroTwo follows the principle of least privilege - tools only receive the minimum permissions needed to function.
Permission Types
Different permission categories control what tools can access.- Conversation Access
- File Access
- Integration Access
- Network Access
- Personal Data
What tools can see in your chatsPermission levels:None:
- Tool cannot access conversation history
- Operates independently
- Example: Image generation (doesn’t need chat context)
- Access to the message that invoked the tool
- No historical context
- Example: Web search (only needs current query)
- Last 5-10 messages for context
- Enough for understanding current topic
- Example: Code interpreter (needs recent code snippets)
- Access to entire conversation history
- Required for context-aware tools
- Example: Memory system (needs full context to store properly)
You can see what level each tool requires in Settings > Tools > [Tool Name] > Permissions.
Granting Permissions
How to approve tool access.First-Time Tool Use
1
Enable tool
When you first enable a tool or integration
2
Permission dialog
ZeroTwo shows what the tool will access:Example for Gmail tool:
3
Review carefully
- Read what data will be accessed
- Check what actions are possible
- Note what is explicitly blocked
- Review privacy policy link
4
Approve or deny
Approve: Tool gets requested permissionsDeny: Tool cannot be usedCustomize (Pro/Enterprise): Select specific permissions
5
OAuth flow (if needed)
For third-party integrations:
- Redirected to service (e.g., Google)
- Sign in if needed
- Approve ZeroTwo access
- Redirected back
- Tool is connected
Permission Prompts During Use
Some tools ask for additional permissions when needed: Example: Canvas wants to export to Google Drive- Allow once: Just for this action
- Allow always: Remember choice
- Deny: Cancel the action
Managing Tool Permissions
Review and modify permissions anytime.Viewing Active Permissions
1
Open settings
Settings > Tools & Integrations > Permissions
2
View by tool
See all tools and their current permissions:Example list:
3
Click Manage
View detailed permissions for any tool
Modifying Permissions
1
Select tool
Click Manage next to the tool
2
Toggle permissions
Enable/disable specific permissions:Gmail example:
- ✅ Read emails (required)
- ✅ Search inbox (required)
- ☑️ Send emails (optional - toggle off)
- ☑️ Create drafts (optional - toggle off)
3
Save changes
Click Save to applyTool will use new permission set immediately
Revoking Access
Complete revocation:1
Open tool settings
Settings > Tools > [Tool Name]
2
Click Revoke Access
Click Revoke All Permissions or Disconnect
3
Confirm
Confirm you want to revoke accessWhat happens:
- All permissions removed
- OAuth tokens revoked (if applicable)
- Tool disabled
- Integration disconnected
- No more data access
4
Re-enable anytime
You can re-connect and grant permissions again later
Data Privacy
How ZeroTwo protects your data when using tools.Data Storage
Where data is stored
Where data is stored
ZeroTwo data storage:Conversation data:
- Encrypted at rest (AES-256)
- Stored in secure databases
- Regional data centers
- Regular backups
- Encrypted in transit and at rest
- Secure object storage
- Access-controlled
- Retention policies applied
- OAuth tokens encrypted
- API keys in secure vault
- Never logged or exposed
- Automatic rotation (when supported)
Data residency options available on Enterprise plans.
Data retention
Data retention
How long data is kept:Conversation history:
- Kept until you delete
- Auto-deletion after inactivity (configurable)
- Deleted on account closure
- Kept until you delete
- Project-based retention policies
- 30-day recovery after deletion
- Activity logs: 90 days
- Security logs: 1 year
- Audit logs: 7 years (Enterprise)
- Cleared when tool disconnected
- Cache expires automatically
- No persistent storage by tools
Data sharing
Data sharing
Who can see your data:Never shared:
- Personal conversations (unless you share)
- Private project data
- API credentials
- Payment information
- Message content (to generate responses)
- Tool call results
- NOT stored for training by default
- Opt-out available for all providers
- Only data you explicitly grant access to
- Controlled by OAuth scopes
- Revocable anytime
- Logged for audit
ZeroTwo never sells your data or uses it for advertising.
Privacy Controls
Settings you can control:- AI Provider Privacy
- Tool Data Access
- Memory & Learning
Control AI provider data usage:Settings > Privacy > AI Provider DataOptions:
- ✅ Zero data retention: Providers delete data after response (default)
- ☑️ Allow training: Let providers use for model training (opt-in)
- ☑️ Allow improvement: Anonymous usage for improvements
- OpenAI: Zero retention available
- Anthropic: Zero retention by default
- Google: Zero retention available
- Others: Check provider policies
Security Best Practices
Review permissions regularly
Review permissions regularly
Monthly security check:
- Review all connected tools
- Revoke unused integrations
- Check permission changes
- Verify OAuth tokens haven’t expired
- Review activity logs
- Update security settings
Use principle of least privilege
Use principle of least privilege
Minimize access:✅ Do:
- Grant only required permissions
- Use read-only when possible
- Revoke when not needed
- Segment data by project
- Use separate accounts for sensitive work
- Grant “allow all” permissions
- Keep unused tools connected
- Share credentials
- Mix personal and work accounts
Protect sensitive information
Protect sensitive information
Handle confidential data carefully:For sensitive projects:
- Mark project as confidential
- Disable non-essential tools
- Enable stricter access controls
- Turn on audit logging
- Require explicit consent for tools
- Use compliance templates
- Enable enhanced encryption
- Implement data retention policies
- Regular compliance audits
- Business Associate Agreements (if needed)
Enable two-factor authentication
Enable two-factor authentication
Secure your account:Settings > Security > Two-Factor AuthenticationBenefits:
- Prevents unauthorized access
- Protects tool permissions
- Secures OAuth connections
- Required for compliance
- Authenticator app (recommended)
- SMS (less secure)
- Hardware key (most secure)
- Backup codes
Monitor tool activity
Monitor tool activity
Watch for unusual behavior:Activity monitoring:
- Unexpected API calls
- Large data downloads
- Failed auth attempts
- Permission escalations
- Email on suspicious activity
- Slack notifications
- Daily summary reports
Compliance & Regulations
Tool privacy in regulated environments.- GDPR Compliance
- HIPAA Compliance
- SOC 2
- Industry Regulations
European data protection:User rights:
- Right to access: Export all tool data
- Right to erasure: Delete all data
- Right to portability: Download data
- Right to object: Opt out of processing
- Data processing agreements (DPAs)
- Consent management
- Purpose limitation
- Data minimization
Tool Security Features
Built-in security mechanisms.Sandboxing
Isolated execution: Code Interpreter:- Runs in E2B sandbox
- No network access by default
- Limited file system
- Resource limits (CPU, memory, time)
- Automatic cleanup
- Isolated processes
- Limited permissions
- Network restrictions
- API rate limiting
Data Encryption
Always encrypted:- In transit: TLS 1.3
- At rest: AES-256
- OAuth tokens: Secure vault
- API keys: Hardware-encrypted
- Automatic rotation
- Separate per organization
- Hardware security modules (Enterprise)
Audit Logging
What’s logged:- Tool activation/deactivation
- Permission grants/revokes
- API calls made
- Data accessed
- Errors and failures
- Configuration changes
Troubleshooting
Tool asking for unexpected permissions
Tool asking for unexpected permissions
Why this happens:
- Tool updated with new features
- More permissions needed for full functionality
- Previous permissions revoked
- Review what permissions are requested
- Check tool changelog for updates
- Contact support if suspicious
- Deny if uncomfortable
- Use alternative tool if needed
Can't revoke permissions
Can't revoke permissions
Possible issues:
- Some permissions are required
- OAuth session hasn’t expired
- Cache needs clearing
- Disconnect integration completely
- Revoke from provider’s side (Google, GitHub, etc.)
- Clear browser cache
- Contact support if stuck
Privacy concerns about a tool
Privacy concerns about a tool
If you’re worried:
- Review tool documentation: Privacy policy, data handling
- Check permissions: What it actually accesses
- Read reviews: Other users’ experiences
- Test in isolation: Use in test project first
- Contact support: Ask specific questions
- Don’t use: If still uncomfortable
- Requesting excessive permissions
- No privacy policy
- Poor reviews about privacy
- Unclear data handling
Next Steps
Custom Extensions
Build and add custom tools
Data & Compliance
Learn about data protection
Security Settings
Configure security options
Integrations
Explore integration options
Understanding tool permissions helps you use ZeroTwo safely and confidently while protecting your data!

