Security

The threat model and the mechanisms that defend against it. Read the threat model first — the other pages are the moving parts that implement it.

Pages

PageWhat it covers
Threat modelWho we defend against, what guarantees we make, what is explicitly out of scope
Host-key trustThe plugin’s own known-hosts store (separate from ~/.ssh/known_hosts), the trust dialog, and host-key rotation
Token handlingThe 32-byte daemon session token: generation, on-disk lifecycle, what happens on a leak
Cosign verifySigstore keyless verification of the daemon binary you downloaded — what the workflow signs, how to check it

Reading order

  1. Threat model — every other page assumes you’ve read this.
  2. Host-key trust — the most user-facing part of the security surface.
  3. Token handling + Cosign verify — operator-facing details that complete the picture.

See also

Reporting a vulnerability

GitHub Security Advisories: obsidian-remote-ssh/security/advisories/new. Coordinated disclosure preferred.

4 items under this folder.