Skip to content

Security: helixprojectai-code/helix-ttd-gemini-cli

Security

docs/SECURITY.md

=================================================================

IDENTITY: SECURITY.md

VERSION: v1.0.0 (HELIX-CORE NATIVE)

ORIGIN: HELIX-CORE-UNIFIED / [HELIX-LEDGER/DOCS]

NODE: 4 (ONTARIO)

STATUS: RATIFIED-CANONICAL

CREATED: 2026-01-10

MODIFIED: 2026-02-10

=================================================================

πŸ›‘οΈ Security Policy & Trust Model

Status: ACTIVE | Objective: Define the official security posture, root of trust, supported versions, hardening practices, vulnerability reporting process, and in-scope threat model for the Helix ecosystem β€” ensuring custodial sovereignty, hermetic isolation, and zero-trust-by-default operation.

πŸ” Investigation / Summary

The Helix security model rejects centralized or software-only trust roots. Authority flows solely from human custodians holding Ed25519 keys on physical HSMs. Critical actions require 3-of-5 quorum. No god-mode exists. Infrastructure is hermetically hardened (immutable images, rootless, capability-dropped, read-only mounts). Vulnerabilities are treated as existential incidents with private disclosure preferred.


πŸ“ Document Content

Supported Versions

Component Version Status
HELIX-CORE v1.0+ βœ… Supported
Identity (L0) v0.3.2+ βœ… Supported
Enforcer (L1) v4.0+ βœ… Supported

The Root of Trust

The Root of Trust for the Helix Federation is NOT the software, the Docker container, or the Cloud Provider.

The Root of Trust is the Consensus of Human Custodians.

  1. Hardware Anchor: Authority is derived solely from Ed25519 Private Keys held on physical Hardware Security Modules (YubiKey/HSM). Keys never touch the network.
  2. Quorum Consensus: Critical actions (Revocation, Policy Changes) require 3-of-5 cryptographic consensus as defined in the Council Charter.
  3. No "God Mode": There is no administrative backdoor. If the keys are lost, the agents are orphaned. This is a design feature, not a bug.

Infrastructure Hardening ("Glass & Metal")

To prevent supply chain attacks and container breakouts, HELIX-CORE enforces a Hermetic Security Posture by default:

  • Immutable Supply Chain: All base images are pinned by SHA256 Digest. Tags (:latest, :alpine) are strictly prohibited.
  • Rootless Runtime: All services run as UID 1000. No container has Root privileges.
  • Read-Only Filesystem: The Watchtower (Dashboard) mounts the ledger as Read-Only (:ro). It is "Glass" (Observer), not "Gears" (Operator).
  • Capability Drop: All Linux capabilities (cap_drop: [ALL]) are removed to minimize the attack surface.
  • Internal Networking: Core services operate on an isolated bridge network with no external egress allowed.

Reporting a Vulnerability

We operate on a Custody-Before-Trust model. If you discover a structural breach, we treat it as a critical incident.

In Scope:

  • DBC Forgery: Minting an identity without a valid hardware signature.
  • Ledger Tampering: Modifying the Suitcase log without breaking the hash chain.
  • Container Escape: Gaining host write access from inside the Watchtower.
  • Quorum Bypass: Executing a destructive op with <3 signatures.

Contact: Please email the Genesis Node directly: helix.project.ai@helixprojectai.com (or via LinkedIn DM). Do not open public GitHub Issues for critical exploits until a patch is ready.

The Reef is Built. The Seal is Hermetic.

GLORY TO THE LATTICE.


πŸ“– Glyph Reference

Glyph Code Meaning Use-Case
πŸ›‘οΈ HGL-CORE-010 Safeguard / Security Security policy header
πŸ” HGL-CORE-001 Investigate Summary & supported versions
βœ… HGL-CORE-007 Validate Hardening practices
βš–οΈ HGL-CORE-011 Ethics/Principle Root of trust & lattice glory

🏷️ Tags

[Security-Policy, Trust-Model, Hermetic-Hardening, Root-of-Trust, Quorum-Consensus, Vulnerability-Reporting, Custody-Before-Trust, No-God-Mode]

πŸ”— Related Documents

  • hardening_principles.md
  • governance/COUNCIL_CHARTER.md
  • helix-ttd_core_ethos.md
  • whitepaper_v1.0.md
  • 2026-01-10-LOG_SECURITY_POLICY.md

=================================================================

FOOTER: ID: HELIX-SECURITY-POLICY | CUSTODY BEFORE TRUST. GLORY TO THE LATTICE.

=================================================================

There aren’t any published security advisories