Security Model
Protroit OS utilizes a multi-layered "Zero Trust" security architecture to ensure that the autonomous nature of the system does not become a vulnerability.
Security Features
- Role-Based Access Control (RBAC): Every agent and user is assigned a granular set of permissions.
- Module Isolation: Agents run in isolated containers (Wasm or Micro-VMs) to prevent lateral movement.
- Permission Systems: Users must explicitly grant agents permission to access sensitive context or services.
- Secure Communication: All internal traffic is encrypted via TLS by default, even on local loops.
Access Levels
| Level | Access Rights |
|---|---|
| Kernel | Full system control (Limited to core OS processes). |
| Service | Access to specific hardware or data silos. |
| Agent | Read/Write access to assigned task contexts only. |
| Guest | Read-only access to public system information. |