Apoth3osis
>_SECURITY

Post-Quantum Security

Classical + post-quantum. Side by side.

AgentHALO's PQ hardening protects all agent-controlled cryptographic surfaces. No CRITICAL or MEDIUM quantum vulnerabilities remain in AgentHALO-controlled code. Three upstream dependencies remain quantum-vulnerable — we disclose them honestly.

>_PQ.STACK

Complete Cryptographic Stack

SurfaceClassicalPost-QuantumCombined
DIDComm authcrypt/anoncryptX25519 ECDHML-KEM-768 (FIPS 203)Hybrid KEM
DIDComm mesh transportX25519 ECDHML-KEM-768 (FIPS 203)Hybrid KEM
Identity signaturesEd25519ML-DSA-65 (FIPS 204)Dual-signed
KEM key derivationHKDF-SHA-512256-bit PQ security
Identity ledger hash chainSHA-512256-bit PQ collision
Attestation Merkle treeSHA-512256-bit PQ collision
EVM transaction signingsecp256k1 ECDSAPQ-gated (Ed25519 + ML-DSA-65)Two-cryptosystem barrier
Gossipsub discoveryEd25519 + ML-DSA-65Addresses stripped (DHT-only)Metadata minimized
>_ENCRYPTION.FLOW

Hybrid Encryption Flow

>_HONEST.VULNERABILITIES

Upstream Quantum Vulnerabilities

We don't claim perfection. We claim transparency. These cannot be fixed unilaterally.

DependencyVulnerabilityImpactMitigation
libp2p Noise XX (X25519)Transport decryptionMetadata only (no DIDComm content)Awaiting PQ Noise variants
Nym Sphinx (X25519)Traffic deanonymizationCommunication patterns (not content)DIDComm hybrid KEM protects payload
Ethereum ECDSA (secp256k1)Key recoveryEcosystem-widePQ-gated signing reduces unilateral risk
NOTE

All three vulnerabilities affect transport and metadata layers only. DIDComm message content is always protected by the hybrid KEM (X25519 + ML-KEM-768), which is quantum-resistant regardless of transport security.

>_OPERATIONAL.SECURITY

Operational Security

Zero Telemetry

Nothing leaves your machine. No analytics, no tracking, no phone-home. All data stored locally.

Encrypted Storage

Genesis material, vault secrets, and provider keys encrypted with AES-256-GCM. Argon2-based password-derived master keys.

File Permissions

Credentials stored with owner-only permissions (0600). No world-readable secrets.

Signal Forwarding

SIGINT/SIGTERM forwarded to child processes for clean shutdown. No orphaned agent processes.

Witness Signatures

Commits carry Ed25519 + ML-DSA-65 witness signatures. Tamper-evident commitment chain.

Certificate Transparency

RFC 6962-style transparency roots for commit history. Append-only seal chaining via monotone seals.

>_ADVANCED.SECURITY

Advanced Security Features

ZK CREDENTIALS

Privacy-Preserving Attestation

RISC Zero guest programs for verifiable computation. Agents prove identity properties, capability levels, or trust tiers without revealing underlying DID data.

CHEBYSHEV EVICTOR

Cache Eviction Policy

Chebyshev-polynomial-based cache eviction for memory management. Optimal eviction scheduling minimizes re-computation while respecting memory bounds.

TRACE TOPOLOGY

Topological Signatures

H0 persistence (Rips complex) analysis on trace structures. Topological signatures fingerprint agent behavior patterns for anomaly detection and attestation.

ECLIPSE DETECTION

Network Isolation Defense

Monitors P2P mesh topology for eclipse attacks. Alerts when an agent's peer set narrows below safety thresholds, indicating potential network view manipulation.

CAPABILITY VERIFICATION

ERC-8004 Capabilities

On-chain capability beacons with task-scoped specifications. Cryptographic verification of agent capabilities before tool access is granted.

CIRCUIT POLICIES

Programmable Access Control

Policy circuits define complex access rules as composable boolean gates. The policy registry manages versioned rule sets across the agent fleet.

>_P2P.COMMUNICATION

Secure Agent Communication

Agents exchange DIDComm v2 encrypted messages using hybrid KEM. Two transport options:

LIBP2P MESH

P2P Discovery

Noise XX handshake + Gossipsub + Kademlia DHT. Agents discover each other via gossip protocol with privacy-preserving address stripping.

NYM MIXNET

Network Anonymity

Sphinx packet format for network-layer anonymity. SOCKS5 proxy or native Sphinx integration. Communication patterns hidden from observers.

Quantum-Resistant Today, Not Someday

Every cryptographic surface under AgentHALO's control is post-quantum hardened.