Security

Security Audits

Planned third-party security audits and ongoing internal security practices. Transparency is a core value.

Generating report...OAS-SEC-2026-001
SECURITY AUDIT REPORT
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Document ClassificationPUBLIC - PRE-AUDIT STATUS
OrganizationOpenAgent Identity
SpecificationOAS v1.1.0
Report Date2026-04-09
Report IDOAS-SEC-2026-001
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PRE-AUDIT

The OAS specification and reference implementations are preparing for their first formal third-party security audit. Internal security practices have been enforced in CI since day one. This document will be updated with full audit reports as they become available.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PLANNED AUDITS
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Audit 1Initial Security Audit
Target DateQ2 2026
AuditorPending selection
ScopeOAS core specification, Rust reference SDK, cryptographic primitives
Status[PLANNED]
Audit 2FROST Implementation Audit
Target DateQ3 2026
AuditorPending selection
ScopeFROST DKG ceremony, threshold signing, key share management
Status[PLANNED]
Audit 3Infrastructure Audit
Target DateQ4 2026
AuditorPending selection
ScopeIdentity services, DHT resolution, Arsenal credential proxy
Status[PLANNED]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
INTERNAL SECURITY PRACTICES
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
#![forbid(unsafe_code)]
All Rust crates compile with unsafe code forbidden. Zero exceptions.
[ENFORCED]
cargo clippy -D warnings
Clippy lints at maximum strictness. No warnings allowed in CI.
[ENFORCED]
cargo audit
Dependency vulnerability scanning on every CI run. Zero known CVEs.
[ENFORCED]
Constant-time operations
All cryptographic comparisons use constant-time algorithms to prevent timing attacks.
[ENFORCED]
ZeroizeOnDrop
All key material is zeroized from memory when dropped. No secrets persist in heap.
[ENFORCED]
Fuzz testing
AFL++ and cargo-fuzz on all parsing, deserialization, and signature verification paths.
[ACTIVE]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
END OF REPORT
Findings0 critical | 0 high | 0 medium | 0 low
ComplianceAll internal gates passing
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -