security.md · 5.3 KB

MindX Security Model

Status:Production Ready - Enterprise deployment with encrypted vault security Last Updated: March 2026 Version: 4.0 (AES-256 Encrypted Vault)

This document outlines the production-ready security architecture of the MindX system, featuring AES-256 encrypted vault storage, advanced authentication, and enterprise-grade security controls.

1. 🔒 Production Security Principles

  • 🔐 Encrypted Storage: All sensitive data stored with AES-256-GCM encryption and PBKDF2 key derivation (100,000 iterations)
  • Deterministic Identities: Agents have stable, persistent identities with encrypted storage preventing key regeneration
  • Centralized Encrypted Vault: Private keys stored in AES-256 encrypted vault with master key protection
  • Multi-Layer Authentication: Advanced rate limiting, session management, and cryptographic challenge-response
  • Brokered Access: All sensitive operations require GuardianAgent authentication with encrypted authorization
  • Zero Trust Architecture: No component trusts any other without cryptographic verification
  • Separation of Concerns: Distinct agents for identity management, access brokering, and security validation
  • 2. Components

    🔐 EncryptedVaultManager - The Secure Ledger

  • Role: Acts as the production-grade encrypted storage system for all sensitive data
  • Storage: Manages AES-256 encrypted vault at mindx_backend_service/vault_encrypted/ with master key protection
  • Encryption: All data encrypted with AES-256-GCM with PBKDF2 key derivation (100,000 iterations) and unique salt
  • Key Storage: Wallet private keys stored in vault_encrypted/wallet_keys/keys.enc with authenticated encryption
  • API Keys: All API keys encrypted and stored in vault_encrypted/api_keys/keys.enc with secure access
  • Migration Support: Automatic migration from legacy .env files to encrypted storage with verification
  • 🆔 IDManagerAgent - The Identity Manager

  • Role: Acts as the interface layer between agents and the encrypted vault
  • Integration: Uses EncryptedVaultManager for all sensitive data operations with encrypted lookup
  • Key Naming: Supports both legacy environment variable format and new encrypted vault entity IDs
  • Primary Method (get_or_create_wallet): Creates identities with encrypted storage and verification
  • Belief System Integration: Fast lookup cache with encrypted backend storage for security
  • GuardianAgent - The Broker

  • Role: Acts as the gatekeeper for all access to sensitive private keys.
  • Challenge-Response: Implements a challenge-response protocol to verify the identity of any agent requesting a private key.
  • 1. An agent requests a challenge for its entity_id. 2. The GuardianAgent generates and stores a unique, temporary token. 3. The requesting agent must sign this token with its private key. 4. The GuardianAgent uses IDManagerAgent.verify_signature to confirm the signature is valid for the public key associated with that entity_id.
  • Key Release: Only if the signature is verified does the GuardianAgent call the privileged id_manager.get_private_key_for_guardian() method to retrieve and return the private key.
  • 3. ✅ Production Security Implementation: AES-256 Encrypted Vault

    The production-grade security system has been fully implemented and deployed with enterprise-level encryption and security controls.

    🔒 Implemented Features:

  • AES-256-GCM Encryption: All sensitive data encrypted with authenticated encryption
  • PBKDF2 Key Derivation: 100,000 iterations with unique salt for maximum security
  • Master Key Protection: Encryption keys secured with additional key derivation layer
  • Automatic Migration: Seamless transition from legacy .env files to encrypted storage
  • Zero Downtime Deployment: Production systems can migrate without service interruption
  • 🛡️ Advanced Security Features:

  • Rate Limiting: Multi-algorithm rate limiting with client reputation tracking
  • Security Middleware: Real-time threat detection and automated response
  • Session Management: Secure session handling with encrypted token storage
  • Access Control: Fine-grained permissions with encrypted authorization
  • Audit Logging: Complete security operation trails with encrypted log storage
  • 🚀 Future Enhancements:

  • Hardware Security Modules (HSM): Integration with dedicated cryptographic hardware
  • Multi-Factor Authentication: Additional authentication layers for critical operations
  • Zero-Knowledge Proofs: Advanced cryptographic protocols for enhanced privacy
  • Quantum-Resistant Cryptography: Future-proofing against quantum computing threats
  • 4. Dependabot / dependency vulnerabilities

  • qs (npm), high – arrayLimit bypass DoS
  • Dependabot reported qs < 6.14.1 (used transitively by Express/body-parser) as vulnerable to memory-exhaustion DoS via bracket notation. Remediation: Added "overrides": { "qs": ">=6.14.1" } in mindx_frontend_ui/package.json and mindx_frontend_ui_backup/package.json, then ran npm install. Lockfiles now resolve qs to 6.14.1; npm audit reports 0 vulnerabilities. (Date: 2026-02-07.)


    All DocumentsDocument IndexThe Book of mindXImprovement JournalAPI Reference