Security

Elydora is designed as responsibility-grade infrastructure. Every layer of the system prioritizes cryptographic integrity, key safety, and access control.

Cryptographic Stack

Key Management

Agent Keys

Each agent has its own Ed25519 key pair. The private key is held exclusively by the agent and never transmitted to Elydora. Only the public key is registered.

Key Generation

bash
# Generate an Ed25519 key pair using OpenSSL
openssl genpkey -algorithm Ed25519 -out agent_private.pem
openssl pkey -in agent_private.pem -pubout -out agent_public.pem

Elydora Server Keys

Elydora signs all Acknowledgement Receipts (EARs) and Epoch Roots (EERs) with its own Ed25519 key. The public keys are available at the JWKS endpoint.

RBAC (Role-Based Access Control)

Elydora enforces fine-grained access control with five predefined roles. Each API endpoint requires a minimum role level. See the full RBAC documentation for details.

Transport Security

Replay Protection

Multiple mechanisms prevent operation replay:

Agent Lifecycle

Data Integrity

Operation records are immutable once accepted. The chain hash mechanism ensures that any modification, deletion, or reordering of records is detectable. Epoch roots provide periodic bulk verification anchors.