Docs_archive
Threat model
Source docs/THREAT_MODEL.md · All_docs
Lightweight document to frame security decisions. Operational detail: PRODUCTION.md.
Assets to Protect
- Application secrets (agent API keys, credentials) — encrypted at rest (
ENCRYPTION_KEY). - User accounts (bcrypt-hashed passwords, JWT sessions).
- Agent infrastructure (Docker / Firecracker, Docker socket, Firecracker paths).
- Audit data (action logging in Postgres).
Primary Attack Surface
Implicitly Out of Scope (Address Per Deployment)
- Network security between agents and inference services (vsock, LAN).
- Supply chain (OCI images, npm dependencies) — follow
npm audit, SBOM, signatures. - Compliance (GDPR, SOC2) — process and retention, not just code.
Evolution
Mesh events (hive:agent:status, hive:system:events) carry meshMeta; with MESH_BUS_HMAC_SECRET, meshSig allows consumers to verify the logical Hive origin (secret shared with trusted subscribers). Extend as needed: inter-agent A2A trust, Agent Card scope (A2A_INTEGRATION.md).