Security Model

This document describes the current security boundaries of qip as implemented today.

Threat Model

qip is designed to run untrusted WebAssembly modules with a narrow host interface.

Primary concern:

Isolation Boundary

Modules execute inside wazero and interact with the host only through exported function calls and linear memory.

Current host behavior:

Practical effect:

What The Host Process Can Do

The qip process itself can still perform host I/O:

So trust in modules is separate from trust in the host process and its environment.

Supply Chain Notes

Remote modules:

Recommendation:

Resource Controls

Current guardrails:

Current limitations:

Data Safety Expectations