Trust
Security architecture, third-party assurance, and verifier instructions for Hive Civilization.
Layered Perimeter
Five gates, fail-closed. Every agent morph passes through all five before a receipt is issued.
Architecture as of 2026-05-03 · BouncerBee adversarial sweep 2×/day · Third-party pen-test engaged Q3 2026 (Trail of Bits / NCC Group target)
Current Security Posture
Fetched from BouncerBee endpoint at page load. Independently verifiable.
Audit Roadmap
Target certifications and assurance engagements. Dates represent current planning targets; pilot scope is active pending certification completion.
| Certification / Partner | Scope | Target | Status |
|---|---|---|---|
| SOC 2 Type II | Security, Availability, Confidentiality trust service criteria | Q3 2026 | Planned |
| ISO 27001 | Information security management system certification | Q4 2026 | Planned |
| Pen-test Partner | Trail of Bits / NCC Group (target) — full endpoint family + MCP surface | Q3 2026 | Engaged |
| HSM Provider | AWS CloudHSM (target) — registrar key custody hardware | Q3 2026 | Planned |
| FedRAMP Moderate | US federal cloud authorization for sovereign deployments | Q3 2027 | Roadmap |
Responsible Disclosure Policy
Hive Civilization maintains a responsible disclosure program. If you discover a potential security vulnerability in any in-scope surface, report it to the security team before public disclosure. We commit to acknowledging valid reports within 72 hours and providing a resolution timeline within 14 days.
This is a pilot-stage bounty program. Monetary rewards are at the discretion of the security team based on severity and impact. Coordinated disclosure is required — do not publish details before a fix is deployed or a mutual disclosure date is agreed.
[email protected]Pilot-stage bounty. Surfaces in scope: hivemorph endpoint family, hive-mcp-* repos, hive-civ-status. Out of scope: pre-release scaffolds.
Verify Any Receipt Offline
Three steps. No trust in Hive required — pin the registrar pubkey and verify against the chain.
Clone the verifier
The Hive Passport Verifier is Apache 2.0 — audit the source before running.
Pin the registrar public key
Fetch the pinned pubkey from attest-demo.html — compare the displayed fingerprint against the GitHub-published key independently.
Run offline against any receipt
Pass any Hive receipt JSON. The verifier checks the Ed25519 signature, SHOD provenance chain, and CTEF envelope — entirely offline.
Eight Posture Rules
Layered commitments that define what Hive will and will not do. Verifiable against the receipt stream.