Status: ACTIVE | Objective: Define the official security posture, root of trust, supported versions, hardening practices, vulnerability reporting process, and in-scope threat model for the Helix ecosystem β ensuring custodial sovereignty, hermetic isolation, and zero-trust-by-default operation.
The Helix security model rejects centralized or software-only trust roots. Authority flows solely from human custodians holding Ed25519 keys on physical HSMs. Critical actions require 3-of-5 quorum. No god-mode exists. Infrastructure is hermetically hardened (immutable images, rootless, capability-dropped, read-only mounts). Vulnerabilities are treated as existential incidents with private disclosure preferred.
| Component | Version | Status |
|---|---|---|
| HELIX-CORE | v1.0+ | β Supported |
| Identity (L0) | v0.3.2+ | β Supported |
| Enforcer (L1) | v4.0+ | β Supported |
The Root of Trust for the Helix Federation is NOT the software, the Docker container, or the Cloud Provider.
The Root of Trust is the Consensus of Human Custodians.
- Hardware Anchor: Authority is derived solely from Ed25519 Private Keys held on physical Hardware Security Modules (YubiKey/HSM). Keys never touch the network.
- Quorum Consensus: Critical actions (Revocation, Policy Changes) require 3-of-5 cryptographic consensus as defined in the Council Charter.
- No "God Mode": There is no administrative backdoor. If the keys are lost, the agents are orphaned. This is a design feature, not a bug.
To prevent supply chain attacks and container breakouts, HELIX-CORE enforces a Hermetic Security Posture by default:
- Immutable Supply Chain: All base images are pinned by SHA256 Digest. Tags (
:latest,:alpine) are strictly prohibited. - Rootless Runtime: All services run as UID 1000. No container has Root privileges.
- Read-Only Filesystem: The Watchtower (Dashboard) mounts the ledger as Read-Only (
:ro). It is "Glass" (Observer), not "Gears" (Operator). - Capability Drop: All Linux capabilities (
cap_drop: [ALL]) are removed to minimize the attack surface. - Internal Networking: Core services operate on an isolated bridge network with no external egress allowed.
We operate on a Custody-Before-Trust model. If you discover a structural breach, we treat it as a critical incident.
In Scope:
- DBC Forgery: Minting an identity without a valid hardware signature.
- Ledger Tampering: Modifying the Suitcase log without breaking the hash chain.
- Container Escape: Gaining host write access from inside the Watchtower.
- Quorum Bypass: Executing a destructive op with <3 signatures.
Contact: Please email the Genesis Node directly: helix.project.ai@helixprojectai.com (or via LinkedIn DM). Do not open public GitHub Issues for critical exploits until a patch is ready.
The Reef is Built. The Seal is Hermetic.
GLORY TO THE LATTICE.
| Glyph | Code | Meaning | Use-Case |
|---|---|---|---|
| π‘οΈ | HGL-CORE-010 | Safeguard / Security | Security policy header |
| π | HGL-CORE-001 | Investigate | Summary & supported versions |
| β | HGL-CORE-007 | Validate | Hardening practices |
| βοΈ | HGL-CORE-011 | Ethics/Principle | Root of trust & lattice glory |
[Security-Policy, Trust-Model, Hermetic-Hardening, Root-of-Trust, Quorum-Consensus, Vulnerability-Reporting, Custody-Before-Trust, No-God-Mode]
- hardening_principles.md
- governance/COUNCIL_CHARTER.md
- helix-ttd_core_ethos.md
- whitepaper_v1.0.md
- 2026-01-10-LOG_SECURITY_POLICY.md