packages/os/linux/variants/milady-tails/docs/security-model.md
This document defines the production security boundary for the elizaOS Live
Tails-derived image. It is intentionally phrased as policy that can be checked
by scripts/security-smoke.sh, not as aspirational product copy.
elizaOS Live has five production trust boundaries:
amnesia user. They do not receive direct root, unrestricted sudo, or
broad polkit authority./usr/local/lib/elizaos/capability-runner and its generated sudoers
allowlist.Failure policy is conservative: if policy state is missing, malformed, or not yet implemented, elizaOS Live must choose the safer mode or refuse activation.
The app must never gain general root. The only elizaOS-owned sudoers entry is:
amnesia -> /usr/local/lib/elizaos/capability-runner root-status
Current broker commands are:
status: unprivileged OS/app statusprivacy-mode: unprivileged privacy-mode stateopen-persistent-storage: user-session helper for the Tails Persistent
Storage UIroot-status: exact root smoke command proving the sudoers path is narrowProduction policy:
ALL, shell, package-manager, service-manager, network-manager, device
writer, or arbitrary-argument sudo rule may be added for elizaOSInherited Tails sudoers rules are reviewed in
inherited-tails-sudoers-review.md.
They are accepted only as inherited Tails feature plumbing for Greeter,
Persistent Storage, Tor Browser, Tails Upgrader, and WhisperBack. elizaOS
policy must not add new broad rules on top of them.
Amnesia mode is the default. In amnesia mode:
/home/amnesia tmpfs and disappears at shutdownPersistent mode is opt-in and uses Tails Persistent Storage. The elizaOS feature owns only these bindings:
/home/amnesia/.eliza/home/amnesia/.milady/home/amnesia/.config/elizaOS/home/amnesia/.config/milady/home/amnesia/.config/Milady/home/amnesia/.cache/ai.elizaos.app/home/amnesia/.cache/ai.milady.miladyProduction policy:
/home/amnesia wholesale,
/etc, /usr, /var, /root, /opt, or an unencrypted external pathfind -P -xdevThe current branch contains the app/runtime verifier foundation, not the full production updater. OS/base updates still require a new signed ISO and a guarded writer until the OS delta path is implemented. Production update activation requires:
Current audit caveat: the verifier foundation exists, but the materialization path still needs hardened no-follow copy semantics or a root-owned quarantine before production use. Treat signed app/runtime updates as architecture in progress until that is fixed and tested.
The Tails IUK stack already contains signed upgrade-description and target-file checks. elizaOS must not bypass that path for OS deltas. App/runtime manifests now have a schema and verifier. Stable release still needs production keys, revocation metadata, downloader/staging UX, model artifact verification, rollback health policy, and signed release evidence.
Every stable release must publish:
Promotion gates:
System-level elizaOS service policy:
NoNewPrivileges=yesPrivateTmp=yesProtectSystem=full or stricterUser-level elizaOS service policy:
ConditionUser=1000NoNewPrivileges=yesdesktop.target or Tor bootstrap for normal modeProduction hardening still needed: AppArmor profile coverage for the elizaOS agent/browser surface, tighter systemd sandboxing for user services, polkit review, and a decision on renderer sandbox posture.
Run the cheap security smoke from the variant root:
scripts/security-smoke.sh
For release candidates, run strict mode:
ELIZAOS_SECURITY_STRICT=1 scripts/security-smoke.sh
Default mode fails on elizaOS-owned policy violations and reports inherited or not-yet-implemented production blockers as warnings. Strict mode fails on those blockers too.