Security Best Practices
🚧 Outline document.
Threat Model
- Persona spoofing
- Memory exfiltration
- Unauthorized skill injection
- Supply chain attacks
Controls
- Signed skills & shells
- TLS everywhere
- Hardware KMS sealing (Secure Enclave / TPM)
- Audit logging with immutability