Agents are programs you didn't write running in environments you do own. KruxOS treats every agent as untrusted by default. Defense is layered. Decisions are logged. Privilege is gated.
Per-capability fork into a fresh, namespaced process running as uid 1100. No long-lived agent shell. Clean state every call.
Secrets never touch the agent's address space. The gateway resolves a placeholder, the syscall happens with the real value, and the value never leaves the kernel mount.
Every capability call — allowed, denied, deferred — lands in a hash-chained CBOR log. Tamper-evident. Streamable. Replayable. The receipts of every decision.
Coordinated, no surprises. Report a finding privately, we acknowledge within 48 hours, and ship a fix on the next release window. Public CVE on agreed timeline.
Mail [email protected] directly — please don't open a public issue for vulnerabilities. We acknowledge within 48 hours and aim to ship a fix in the next release window. We don't currently run a bug bounty program; recognition is via the security hall of fame and a coordinated CVE on agreed timeline.