The author
Writes the SKILL.md, declares capabilities and permissions, and signs with a personal key.
- Honest capability declarations
- Tightest reasonable permission scope
- Keeping the signing key private
A signature proves who said what, when. It does not prove the thing they said is correct or harmless. AutoVault's security model rests on three pillars — what we sign, what we don't sign, and where the trust boundary actually lives. This page is for staff engineers and security teams who want to inspect that model before they deploy.
AutoVault explicitly does not claim to make untrusted code safe. Instead, the system splits the job into three roles. Each role has a narrow, well-defined responsibility, and we never blur the lines between them.
Writes the SKILL.md, declares capabilities and permissions, and signs with a personal key.
Validates, signs, indexes, and delivers the caller-specific view.
Loads, interprets, and executes the skill within its own sandbox and tool-call boundary.
Every skill, installed, mirrored, or proposed by an agent at runtime, runs through these stages in order. Counts shown are from the public vault as of v0.4.1.
Trailing commas, mixed indentation, and unquoted special chars are fixed before the strict schema check.
Known-bad patterns: credential stealers, fork bombs, and exfiltration paths.
Mismatch between declared tools and observed behavior is rejected.
Text similarity in V1 and embedding-space matching in V2 preview stop duplicate explosions at the door.
If AutoVault admits it, AutoVault signs it and records the chain back to the author key.
The denylist is itself a signed, versioned artifact. You can mirror it, audit it, and propose additions through public review.
An isnad is a chain of transmission: who said what, who heard it, who passed it on. Each link is its own Ed25519 signature; tampering with any link breaks the chain.
We treat skill ecosystem vulnerabilities the way mature infrastructure projects do: coordinated disclosure, public advisory, and patch-first response.
If you found a vulnerability in the gate, CLI, renderer, or a denylist bypass, report it before public disclosure.
The CLI is Apache-2.0 and self-buildable from a tagged commit. The denylist is public and signed. The gate is reproducible from the same skill bytes.