Skip to content

Security

ctx

Security model, agent hardening, and vulnerability reporting.


Security Design

Trust model, what ctx does for security, permission hygiene, state file management, and the log-first audit trail principle. Read first to understand the security boundaries.


Securing AI Agents

Defense in depth for unattended AI agents: five layers of protection, each with a known bypass, strength in combination.


Reporting Vulnerabilities

How to report a security issue: email, GitHub private reporting, PGP-encrypted submissions, what to include, and the response timeline.