Security

Outcome

Understand current security controls, known partial areas, and how to verify your local deployment quickly.

1) Security defaults

By default, Carapace starts in a local-first, fail-closed posture:

2) Subprocess sandboxing status

Current platform status for sandbox-required subprocess paths:

3) Verify key controls

Run these from a second terminal while Carapace is running:

cara status --host 127.0.0.1 --port 18789
curl -sS http://127.0.0.1:18789/health
curl -sS -o /dev/null -w "%{http_code}\n" http://127.0.0.1:18789/control/status
curl -sS -o /dev/null -w "%{http_code}\n" -H "Authorization: Bearer ${CARAPACE_GATEWAY_TOKEN}" http://127.0.0.1:18789/control/status
cara logs -n 200

Quick checks:

4) Trust model and caveats

Carapace is preview software. Verified and partial feature status is tracked in:

Read the full threat model and control details:

5) Report vulnerabilities privately

Do not post security vulnerabilities publicly. Use:

https://github.com/puremachinery/carapace/security/advisories/new