HyOS
Security

Security Overview

Threat model, defense in depth, and authentication layers in HyOS.

Pre-1.0 Disclaimer: HyOS is pre-release software under active development. The server manager should not be exposed to the public internet until the 1.0.0 release. It is designed for use on trusted local networks or behind a VPN.

HyOS is a multi-container system with several trust boundaries and authentication layers. This section documents the security model, provides hardening guidance, and honestly catalogues known limitations.

Threat Model

A typical HyOS deployment has four trust boundaries:

BoundaryDescriptionExample Threats
External Network → Docker HostTraffic from the internet or LAN reaching exposed portsUnauthorized access, port scanning, DDoS
Docker Host → ContainersIsolation between the host OS and container workloadsContainer escape, Docker socket abuse
Container → ContainerCommunication between the server and manager containersAPI impersonation, shared volume tampering
Container InternalsProcesses within a single containerPrivilege escalation, token theft

HyOS is designed for trusted local networks. The primary assumption is that users deploying HyOS control the network segment and restrict external access via firewall rules or VPN.

Defense in Depth

Each trust boundary is protected by one or more controls:

BoundaryControls
External → HostFirewall rules, reverse proxy with TLS, VPN access
Host → ContainerNon-root execution, no-new-privileges, capability dropping, read-only socket mount
Container → ContainerAPI authentication (JWT), shared volume file permissions
Container InternalsPrivilege dropping via su-exec, restricted token file permissions (600/700), bcrypt password hashing

See Hardening for actionable configuration steps.

Authentication Layers

HyOS has three independent authentication mechanisms:

LayerMechanismProtectsDetails
Manager Dashboardiron-session encrypted cookies + bcryptWeb UI accessAuthentication Details
REST API PluginOAuth2 client credentials + RS256 JWTAPI endpointsAuthentication Details
Hytale PlatformOAuth 2.0 Device Authorization FlowServer identityAuthentication Details

Vulnerability Reporting

If you discover a security vulnerability, please report it privately — do not create a public GitHub issue. See SECURITY.md for reporting instructions.

On this page