Agent Technical Security Report
Overview
This report provides a technical overview of the security controls implemented in the ProjectAchilles agent for customer security review.
Agent Architecture
The agent is a statically compiled Go binary that runs as a system service. It communicates with the backend exclusively over HTTPS using mutual authentication (API key + TLS).
Security Controls
Enrollment
- Token-based with configurable TTL and max uses
- Timing-oracle resistant authentication
- Rate limited (5 requests / 15 min)
Communication
- TLS enforced for non-localhost servers
- Replay protection via timestamp validation (5-min window)
- All requests include agent ID and API key headers
Credential Protection
- API key encrypted at rest with AES-256-GCM
- Encryption key derived from machine ID via HMAC-SHA256
- Credentials are non-portable (bound to specific machine)
Binary Integrity
- SHA256 checksum verification on all downloaded binaries
- Ed25519 digital signatures on agent updates
- Public key distributed during enrollment
Task Execution
- Binaries run in isolated temp directories (mode 0700)
- Directories cleaned after execution
- Exit codes and output captured for reporting
Self-Updates
- Ed25519 signature verification before applying
- Atomic file replacement
- Service auto-restart after update
Monitoring & Audit Trail
- 60-second heartbeat interval with system metrics
- All actions logged with timestamps
- Stale task detection for offline agents