Designed by a company with 1-10 employees (AngelList).
Are we really supposed to believe that their small team totally got security right 100% on their first try without the decades of community auditing vanilla ssh has enjoyed?
Imagine if SpaceX -did- use this tool. Blackmailing or phishing one employee to gain access to all of SpaceX systems sounds like a state actors wet dream.
Anyone who considers a product like this has no business protecting access to their employers systems IMO.
Maybe if they open source it, place bug bounties for extensive community auditing, allow fully on prem deployments, offer consulting/support contracts, and do all PKI in HSMs end to end...