Skip to content

Security: staticpayload/obelisk.build

Security

docs/SECURITY.md

Security Policy

Supported Versions

Version Supported
0.1.x Yes

Reporting a Vulnerability

To report a security vulnerability:

  1. Email: security@obelisk.build
  2. Include details about the vulnerability
  3. Include steps to reproduce if applicable
  4. We will respond within 48 hours

Security Model

OBELISK is designed with defense in depth:

1. Sandboxing

Actions run in sandboxes with:

  • Restricted filesystem access
  • No network access (by default)
  • No access to undeclared inputs
  • No write access outside declared outputs
  • Resource limits enforced

2. Cache Integrity

  • All cache entries are checksummed
  • Cache keys include all relevant inputs
  • Cache poisoning is prevented by key design

3. Protocol Security

Remote execution uses:

  • Versioned protocol messages
  • Message size limits
  • Checksums on payloads
  • Authentication hooks (pluggable)

4. Build Bundles

Bundles are verified:

  • All entries have checksums
  • Tampering is detected on load
  • Divergence is detected on replay

Threat Model

Trust Boundaries

Trusted:

  • OBELISK binaries
  • Configuration files (OBELISK files)
  • Declared toolchains

Untrusted:

  • User-provided build scripts
  • Downloaded dependencies
  • Remote cache content (verified)

Mitigations

Threat Mitigation
Cache poisoning Content addressing + checksums
Data exfiltration Network blocking by default
  • Privilege escalation | Sandbox + resource limits | | DoS via large outputs | Output size limits | | DoS via deep graphs | Graph complexity limits |

Security Best Practices

  1. Pin toolchains: Declare exact versions
  2. Verify bundles: Check bundle signatures
  3. Use sandboxes: Don't disable without reason
  4. Review configs: Check OBELISK files before building
  5. Run updates: Keep OBELISK updated

Security Audits

OBELISK undergoes:

  • Regular fuzzing of all parsers
  • Static analysis with clang-tidy
  • Dynamic analysis with sanitizers
  • Annual external audit (planned)

There aren’t any published security advisories