| Version | Supported |
|---|---|
| 0.1.x | :white_check_mark: |
Preferred path (private):
Security tab -> AdvisoriesReport a vulnerabilityIf private advisory reporting is unavailable, open a minimal public metadata
issue using the Security report (public metadata only) issue template and do
not include exploit details.
Initial triage target: acknowledgement within 48 hours.
AegisBPF includes multiple security hardening features:
When running with --seccomp, the agent applies a strict seccomp-bpf filter that only allows necessary system calls. This limits the attack surface if the agent is compromised.
aegisbpf run --seccomp
An AppArmor profile is provided in packaging/apparmor/usr.bin.aegisbpf. To install:
sudo cp packaging/apparmor/usr.bin.aegisbpf /etc/apparmor.d/
sudo apparmor_parser -r /etc/apparmor.d/usr.bin.aegisbpf
SELinux policy files are provided in packaging/selinux/. To install:
cd packaging/selinux
make -f /usr/share/selinux/devel/Makefile aegisbpf.pp
sudo semodule -i aegisbpf.pp
sudo restorecon -Rv /usr/bin/aegisbpf /etc/aegisbpf /var/lib/aegisbpf
AegisBPF requires the following capabilities:
| Capability | Purpose |
|---|---|
CAP_SYS_ADMIN |
BPF operations (loading programs, accessing maps) |
CAP_BPF |
BPF syscall access (Linux 5.8+) |
CAP_PERFMON |
Performance monitoring for BPF |
CAP_NET_ADMIN |
Network-related BPF hooks |
CAP_SYS_RESOURCE |
Raise memlock limit for BPF maps |
All releases are signed using Sigstore Cosign. To verify a release:
cosign verify-blob \
--certificate aegisbpf-*.tar.gz.pem \
--signature aegisbpf-*.tar.gz.sig \
--certificate-identity-regexp 'https://github.com/aegisbpf/aegisbpf/*' \
--certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
aegisbpf-*.tar.gz
Use the dedicated runbook for key rotation and revocation:
docs/KEY_MANAGEMENT.mdscripts/sign_policy_external.sh (KMS/HSM-style external signer workflow)In production, prefer signed policy bundles plus:
aegisbpf policy apply --require-signature--seccomp in production.--sha256 to verify integrity.policy lint to validate policies.config/prometheus/alerts.yml.