How OneQuery gives LLMs a safe, auditable data access layer without handing them raw production credentials.
OneQuery Creates the Execution Boundary
OneQuery's first job is to separate credentials from the model runtime. The agent does not need the original database password or API token. OneQuery manages the data source connection, and the agent sends bounded requests against sources it is allowed to use.
The second job is to reduce what can execute. Before running a query, OneQuery applies read-only validation and single-statement enforcement. If the model accidentally drafts destructive SQL, the execution layer rejects it before it reaches the backing system.
The third job is to bound the response. LLMs often ask for more data than they need. OneQuery uses timeouts, row limits, payload limits, and provider-specific cost limits where available so one query does not turn into excessive spend or unnecessary data exposure.
Denials and Failures Are Normal Flow
In a safe system, denial is not an incident. It is a normal lifecycle transition. A query that is not read-only becomes denied. A result that is too large becomes truncated. A missing permission becomes a permission failure.
That distinction matters for LLM agents. Instead of throwing an exception that encourages the model to improvise a workaround, the system returns a clear state and reason. The agent can explain the result to the user or write a narrower query.
This is also why OneQuery keeps an audit log. The question after a data action is not only "did it succeed?" Operators need to know who asked, which source was used, which SQL ran, which limits applied, and where the workflow failed if it failed.
Connectors Keep Credentials Local
For sensitive infrastructure, where credentials live matters. A OneQuery connector runs inside customer infrastructure, polls for work over outbound HTTPS, executes the query locally, and returns the result.
For example, an Athena connector can use EC2 IAM Role credentials to run Athena queries inside the customer's environment. The OneQuery control plane coordinates the job and receives the result, but the original credential does not need to move into the hosted control plane.
This is the practical compromise teams need for LLM adoption. The agent can answer from real operational data, but it does not directly hold the source credential. Operators manage source access, roles, validation, limits, and audit behavior at the product boundary.
Trust the Workflow, Not the Model
The goal of safe LLM usage is not to fully trust the model. The thing to trust is the workflow around the model.
LLMs are good at language, planning, SQL drafting, and result interpretation. Deterministic systems are better at permission checks, credential management, write prevention, audit records, timeouts, and retries.
OneQuery separates those responsibilities. The model asks the question. OneQuery keeps the boundary. That difference is what turns data agents from risky production access into useful automation.