Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Security Considerations

This page summarizes the current security model, known risks, and operational guidance.

Threat Model (Current)

  • MuroDB is an embedded database library/CLI, not a network server.
  • Encrypted mode (aes256-gcm-siv) targets at-rest confidentiality and tamper detection for DB/WAL pages.
  • Plaintext mode (--encryption off) is explicit opt-in and provides no cryptographic protection.

Known Risks

RiskImpactStatus
Malformed page/cell metadata can currently trigger panic paths instead of clean corruption errorsProcess abort (availability) when opening/querying corrupted files, especially relevant in plaintext modeTracked: #182
Plaintext mode has no confidentiality/integrity guaranteesData can be read/modified offline without cryptographic checksBy design
No built-in user authentication/authorization layerAccess control depends on host process + filesystem permissionsBy design

Operational Guidance

  • Prefer encrypted mode for production data.
  • Avoid passing secrets via CLI args (--password) when possible; use interactive prompt.
  • Treat database files as trusted inputs only until #182 is addressed.
  • Apply OS-level controls: file permissions, disk encryption, process isolation, and secrets management.