Skip to main content

Security Architecture

Documentation Index | Previous: Plugin Ecosystem | Next: Testing Framework

V6 Security Status

This document is intentionally conservative. Under the V6 architecture rules, security language is normative only when it maps to current repository surfaces, operational workflows, and explicit validation. Hard isolation, capability-safety, or enterprise security-program language is deferred unless the repo also shows the implementation and tests for it → V6 Architecture Specification

Normative For This Stage

  • process-defined governance and approval gates,
  • event-sourced run journals and replayable state,
  • plugin manifests, hook routing, and per-harness plugin compilation as concrete control surfaces,
  • conservative documentation of sandbox and permission limits instead of blanket guarantees.

Deferred For This Stage

  • enterprise identity and authorization programs,
  • tamper-evident or cryptographically protected audit systems,
  • active anomaly detection and automatic threat response,
  • strong plugin isolation or capability enforcement claims.

Threat Model and Documentation Boundaries

Primary Attack Vectors

Code Injection: Malicious plugin code, unsafe hook behavior, or prompt-driven command execution

Privilege Escalation: A tool, plugin, or harness obtaining broader filesystem, process, or network access than intended

Data Exposure: Unauthorized access to session state, prompts, credentials, or project artifacts

Resource Exhaustion: Infinite loops, runaway shells, or excessive memory/CPU usage

Supply Chain Risk: Compromised dependencies, plugin bundles, or generated install surfaces → Plugin Ecosystem

Trust Boundaries As They Exist Now

Harness Boundary: External CLIs and model providers are operational dependencies, not proven isolation barriers

Filesystem Boundary: The current stack uses filesystem-backed state, artifacts, and plugin surfaces, so access must be treated as a real security concern rather than an abstract platform detail

Plugin and Hook Boundary: Unified plugin sources, manifests, and hook adapters are validation surfaces that require careful review, packaging discipline, and explicit documentation of limits

Network Boundary: External services and package registries expand the attack surface and require per-integration scrutiny

Normative V6 Security Controls

Governance and Approval Controls

Human Approval Breakpoints: Risky workflow steps can require explicit user approval before execution

Deterministic Workflow Gates: Process-defined shell checks, replay, and task state give V6 a concrete way to validate some operational claims without implying broader security guarantees

Rollback-Oriented Execution: Runs, journals, and task artifacts make it possible to inspect what happened and recover from bad orchestration state

Packaging and Validation Controls

Plugin Manifests and Generated Bundles: The concrete delivery path is the plugin and hook surface that the repo already builds and ships

Command-Level Validation: Claims that exceed generic risk framing should point to real commands, tests, or package outputs, not only to architecture narrative

Scoped Documentation: V6 documentation must distinguish current controls from future ambitions instead of presenting a full enterprise security stack as already shipped

Sandbox and Isolation Language

No Hard Isolation Claim: V6 does not claim process isolation, capability safety, or plugin-safe execution by default

Harness-Specific Limits: A harness may expose permission prompts, sandboxing modes, or restricted tool surfaces, but those are implementation details that must be documented where they actually exist

Evidence Before Assurance: Any stronger security statement needs implementation evidence and explicit test coverage before it becomes normative → V6 Architecture Specification

Deferred Security Goals

The following topics may still matter strategically, but they are not current V6 commitments:

  • Enterprise Identity: Multi-factor authentication, Single Sign-On integration, and X.509-based service authentication
  • Enterprise Authorization: Role-based access control, attribute-based access control, and centralized policy-enforcement narratives
  • Tamper-Evident Audit Guarantees: Cryptographic signatures, checksums, or comparable audit-log integrity systems
  • Active Monitoring and Automated Response: Anomaly detection, automatic threat mitigation, and automated forensic or recovery flows
  • Stronger Isolation: Harder plugin containment, runtime capability enforcement, and deeper resource-abuse controls

These items should be described as goals, hypotheses, or future implementation work until the repo contains the concrete enforcement path and validation that would justify stronger wording.

Documentation Rule For Security Topics

  • mark sections as normative or deferred,
  • tie normative claims to present repo surfaces, commands, or tests,
  • prefer explicit limitations over assurance language,
  • treat future security programs as roadmap material rather than present architecture.

Secure Development Posture For This Stage

Security-Oriented Engineering Practices

Least Privilege As An Operating Goal: Prefer narrow permissions and reviewable task scopes, but do not represent that preference as a proved platform guarantee

Defense Through Reviewable Surfaces: Process definitions, journals, manifests, and generated outputs are part of the control story because they can be inspected and validated

Validation Before Promotion: Security-sensitive claims should move from deferred to normative only when backed by implementation evidence, tests, and repository paths

Rollback Planning: Recovery and rollback remain essential because the current stack is operationally complex and not yet a fully hardened security platform


Related Documents: Plugin Ecosystem | Package Specifications | Implementation Roadmap