Skip to main content

Security Best Practices

🚧 Outline document.

Threat Model

  • Persona spoofing
  • Memory exfiltration
  • Unauthorized skill injection
  • Supply chain attacks

Controls

  1. Signed skills & shells
  2. TLS everywhere
  3. Hardware KMS sealing (Secure Enclave / TPM)
  4. Audit logging with immutability
More details coming soon.