Skip to main content
Version: v0.12.3

Security Architecture

PEAC's security model is designed around offline verification, fail-closed defaults, and no implicit network I/O. This page links to the detailed security specifications in the protocol repository.

For vulnerability reporting and disclosure policy, see Security Policy.


Verification Security

DocumentDescription
Verifier Security ModelTrust boundaries, key resolution, signature verification, claim validation
Security ConsiderationsThreat model, attack vectors, mitigations
Trust Pinning PolicyIssuer allowlists, key pinning, trust-on-first-use
Kernel ConstraintsFail-closed validation in issue() and verify() paths

Transport Security

DocumentDescription
HTTP Transport SecurityCORS, rate limiting, size limits, localhost binding
MCP Compliance MatrixMCP security controls: session isolation, SSRF prevention, static policy
OWASP ASI MappingASI-01 through ASI-10 zero-trust control mapping

Issuer Operations

DocumentDescription
Issuer Ops BaselineKey management, rotation, revocation, JWKS publication
Hot-Path ResilienceIssuance reliability, graceful degradation, circuit breakers
Key Rotation5-state FSM, 30-day overlap, kid reuse detection

Security Defaults

PEAC ships with fail-closed security defaults:

  • Issuer allowlist required: verifiers must explicitly trust issuers
  • Unknown tags rejected: unrecognized receipt fields produce errors
  • Replay protection: nonce and timestamp validation required
  • SSRF prevention by design: no ambient key discovery, no implicit fetch
  • Ed25519 only: single algorithm, no algorithm confusion attacks
  • JOSE hardening: embedded keys rejected, crit rejected, b64:false rejected, zip rejected