Silas Silas
Trust › Threat Model · Last reviewed 2026-04-22 · Framework: MITRE ATLAS v1.0-draft

Threat Model

Silas runs LLM agents with operational access to network and security infrastructure. That attack surface spans the AI system, the supply chain, and the customer environment. This document maps it.

Adversary classes

Class Capability Typical objective
External attackerInternet-originated; no installCredential theft, prompt injection, SSRF
Malicious publisherPublishes an MCP, capsule, or prompt to a trust tierSupply-chain compromise of installs that fetch their artifact
Compromised tenant insiderValid install, valid credentials, elevated appetiteCross-tenant exfil, lateral movement, audit tampering
Channel-injected prompt adversaryControls content reaching the LLM via a tool outputPrompt injection → unauthorized tool call
Supply-chain adversaryUpstream dependency, upstream Codex fork, GHCR base imageBackdoored binaries, dependency confusion

Trust boundaries

TB-1
Activation & Enrollment

install-to-gateway; forge install_id, steal provisioned credentials

TB-2
Hub ↔ Leaf NATS

per-install mTLS + NKey; impersonate an install, replay traces

TB-3
MCP Subprocess

edge orchestrator ↔ MCP stdio; malicious MCP prompt-injection

TB-4
Vendor Device

silas-ssh ↔ customer infrastructure; credential misuse, unapproved writes

TB-5
Capsule Distribution

GCS → install; replace, tamper, exfil-and-decrypt

Threat matrix

14 prioritized threats shown. Full 37-threat matrix versioned internally; public list expands as controls ship.

ID ATLAS Tactic Threat Sev Current mitigation Residual gap
SL-T01Reconnaissance (AML.T0000)Attacker scrapes public repos for CLAUDE.md, preferences.tomlMediumSanitizer redacts on outputDeveloper secret-paste — training
SL-T02Initial Access (AML.T0010)Forged install activationHighNKey challenge-response, admin approvalGateway bearer rotation not automated
SL-T03Initial Access (AML.T0012)Malicious MCP in ~/.silas/mcp.d/CriticalDeny-by-default shell & pathsMCP signing not enforced — Epic P3
SL-T04Execution (AML.T0050)Prompt injection via fetched contentCriticalXML-tag wrapping + sanitizerNo per-source quarantine — Epic P7
SL-T05Execution (AML.T0051)Malicious tool output → unauthorized shellCriticalApproval queues; preferences allowlistsPreset wiring incomplete — Epic P8
SL-T06Persistence (AML.T0020)Attacker modifies capsule on diskHighSHA-256 checksum on decryptCapsule signature — Epic P1
SL-T07Persistence (AML.T0020)Tampering with credentials.json at restHighNone todayEpic P2 — credential at-rest encryption
SL-T08Defense Evasion (AML.T0030)Decompile CLI → extract 1Password service tokenCriticalXOR+base64 (not crypto)Epic P4 — replace with keychain
SL-T09Discovery (AML.T0040)Enumerate installs / tenants via admin APIMediumGateway bearer; admin GitHub OAuthtenant_id not enforced — Epic P6
SL-T10Exfiltration (AML.T0060)Exfil Gandalf capsule, decrypt offlineHighage encryption, machine-bound passphrasePassphrase deterministic — Epic P5
SL-T11Exfiltration (AML.T0061)Log exfil via ClickHouse queryMediumClickHouse TLS; NATS subject scopingRow-level tenant filter — Epic P6
SL-T12Impact (AML.T0070)Unauthorized production config pushCriticalIntent apply gate (policy + canary)Some vendor MCPs still have bare write tools
SL-T13Impact (AML.T0071)Audit-log tamper / deleteHighNATS append-only; 30d retentionNo hash chain / signed events — Epic P7
SL-T14Supply Chain (AML.T0100)Upstream Codex fork compromiseCriticalNightly rebase, CodeQL, lockfile pinningNo signed upstream verification — Epic P3

Critical attack chains

1. Malicious MCP → tool poisoning → cross-tenant prompt leak

SL-T03 → SL-T04 → SL-T09 → SL-T11

2. Decompile CLI → extract service token → impersonate any install

SL-T08 → SL-T02

3. Capsule exfil → offline decrypt → policy inference

SL-T10 (machine-bound passphrase weakness)

4. Compromised dependency → backdoored MCP → production push

SL-T14 → SL-T03 → SL-T12

5. Prompt injection via email tool → unapproved write to F5

SL-T04 → SL-T05 → SL-T12

Severity rubric

Critical

Compromises multiple installs or production infrastructure

High

Single-install compromise or significant exfiltration

Medium

Limited-scope leak or denial of service

Low

Informational or hardening-class finding

Threat matrix is reviewed each quarter and on any new MCP, capsule, or trust-boundary change. Report findings to [email protected] — see the disclosure program.