Security
This page covers Archon’s security model: how AI permissions work, how platform access is controlled, how webhooks are verified, and what data is and is not logged.
Permission Model
Section titled “Permission Model”Archon runs the Claude Code SDK in bypassPermissions mode. This means the AI agent can read, write, and execute files without interactive confirmation prompts.
Why this is used:
- Archon is designed for automated, unattended workflows triggered from Slack, Telegram, GitHub, and other platforms where there is no human at a terminal to approve each action.
- Requiring interactive permission prompts would block every workflow and make remote operation impossible.
What this means in practice:
- The AI assistant has full read/write access to the working directory (the cloned repository or worktree).
- It can run shell commands, modify files, and use all tools available to the Claude Code SDK.
- There is no per-action confirmation step.
Mitigations:
- Each conversation runs in an isolated git worktree by default, limiting the blast radius of any changes.
- Workflows support per-node tool restrictions (see below) to constrain what the AI can do at each step.
- The system is designed as a single-developer tool — there is no multi-tenant isolation.
Tool Restrictions
Section titled “Tool Restrictions”Workflow nodes support allowed_tools and denied_tools to restrict which tools the AI can use at each step. This is useful for creating sandboxed steps that can only read code (not modify it) or preventing specific tool usage.
nodes: - id: review prompt: "Review the code for security issues" allowed_tools: [Read, Grep, Glob] # Can only read, not write
- id: implement prompt: "Fix the issues found" denied_tools: [WebSearch, WebFetch] # No internet accessHow it works:
allowed_toolsis a whitelist — only listed tools are available. An empty list ([]) disables all tools.denied_toolsis a blacklist — listed tools are blocked, all others are available.- These are mutually exclusive per node. If both are set,
allowed_toolstakes precedence. - Tool restrictions are currently supported for the Claude provider only. Codex nodes with
denied_toolswill log a warning;allowed_toolsis not supported by the Codex SDK.
Data Privacy and Logging
Section titled “Data Privacy and Logging”Archon uses structured logging (Pino) with explicit rules about what is and is not recorded.
Never logged:
- API keys or tokens (masked to first 8 characters +
...when referenced) - User message content (the text users send to the AI)
- Personally identifiable information (PII)
Logged (with context):
- Conversation IDs, session IDs, workflow run IDs
- Event names (e.g.,
session.create_started,workflow.step_completed) - Error messages and types (for debugging)
- Unauthorized access attempts (with masked user IDs, e.g.,
abc***)
Log levels:
- Default:
info(operational events only) - Set
LOG_LEVEL=debugfor detailed execution traces - CLI:
--quiet(errors only) or--verbose(debug)
Adapter Authorization
Section titled “Adapter Authorization”Each platform adapter supports an optional user whitelist via environment variables. When a whitelist is configured, only listed users can interact with the bot. When the whitelist is empty or unset, the adapter operates in open access mode.
| Platform | Whitelist Variable | Format |
|---|---|---|
| Slack | SLACK_ALLOWED_USER_IDS | Comma-separated Slack user IDs (e.g., U01ABC,U02DEF) |
| Telegram | TELEGRAM_ALLOWED_USER_IDS | Comma-separated Telegram user IDs |
| Discord | DISCORD_ALLOWED_USER_IDS | Comma-separated Discord user IDs |
| GitHub | GITHUB_ALLOWED_USERS | Comma-separated GitHub usernames (case-insensitive) |
| Gitea | GITEA_ALLOWED_USERS | Comma-separated Gitea usernames (case-insensitive) |
Authorization behavior:
- Whitelist is parsed once at adapter startup (from the environment variable).
- Every incoming message or webhook is checked before processing.
- Unauthorized users are silently rejected — no error response is sent back.
- Unauthorized attempts are logged with masked user identifiers for auditing.
- The Web UI has no built-in user authentication. Use
CADDY_BASIC_AUTHor form auth when exposing it publicly (see Docker / Deployment variables).
Webhook Security
Section titled “Webhook Security”The GitHub and Gitea adapters verify webhook signatures to ensure payloads originate from the configured platform and have not been tampered with.
GitHub:
- Uses the
X-Hub-Signature-256header - HMAC SHA-256 computed over the raw request body using
WEBHOOK_SECRET - Timing-safe comparison prevents timing attacks
- Invalid signatures are rejected and logged
Gitea:
- Uses the
X-Gitea-Signatureheader (raw hex, nosha256=prefix) - Same HMAC SHA-256 verification and timing-safe comparison
- Invalid signatures are rejected and logged
Setup:
- Generate a random secret:
openssl rand -hex 32 - Set it in both the platform webhook configuration and Archon’s environment (
WEBHOOK_SECRETfor GitHub,GITEA_WEBHOOK_SECRETfor Gitea) - The secrets must match exactly
Secrets Handling
Section titled “Secrets Handling”Environment files:
- All secrets (API keys, tokens, webhook secrets) belong in archon-owned
.envfiles (~/.archon/.envor<cwd>/.archon/.env), never in source control. - Never put archon secrets in
<cwd>/.env— that file is stripped at boot (see below) andarchon setupnever writes to it. Put them in~/.archon/.env(home scope) or<cwd>/.archon/.env(project scope). - Archon’s
.gitignoreexcludes.envfiles.<cwd>/.archon/.envshould also be gitignored (project-local secrets).
Subprocess env isolation:
- At startup,
stripCwdEnv()removes all keys that Bun auto-loaded from the CWD.envfiles (.env,.env.local,.env.development,.env.production), plus nested Claude Code session markers (CLAUDECODE,CLAUDE_CODE_*except auth vars) and debugger vars (NODE_OPTIONS,VSCODE_INSPECTOR_OPTIONS). This runs before any module readsprocess.env. - Then
loadArchonEnv(cwd)loads archon-owned env from~/.archon/.env(user scope) and<cwd>/.archon/.env(repo scope, wins over user) withoverride: true. Both are trusted sources — the user controls them and all keys are intentional. - Per-codebase env vars configured via
codebase_env_varsor.archon/config.yamlenv:are merged on top at workflow execution time. <cwd>/.envis the only untrusted source. It belongs to the target project, not to Archon. Directory ownership (.archon/) is the security boundary — not the filename.
Target repo .env isolation
Section titled “Target repo .env isolation”Archon prevents target repo .env from leaking into subprocesses through structural protection:
- Boot cleanup:
stripCwdEnv()removes Bun-auto-loaded CWD.envkeys fromprocess.envbefore any application code runs. This is the primary guard — every subprocess Archon spawns inherits from the already-cleanedprocess.env. - Claude Code subprocess: when the SDK is configured to spawn a Bun-runnable JS entry point (legacy npm-installed
cli.js/cli.mjs/cli.cjs), Archon also passesexecutableArgs: ['--no-env-file']so Bun skips its env autoload inside the spawned process. SDK 0.2.x ships per-platform native binaries instead — those don’t auto-load.envfrom cwd, so the flag is unnecessary and is omitted. - Bun script nodes:
bun --no-env-fileprevents script node subprocesses from loading target repo.env. - Bash nodes: Not affected — bash does not auto-load
.envfiles.
Archon’s own env sources (~/.archon/.env, dev .env) are loaded after the CWD strip and pass through to subprocesses normally.
If you need env vars available during workflow execution, use managed env injection:
.archon/config.yamlenv:section (per-repo, checked into version control)- Web UI: Settings → Projects → Env Vars (per-codebase, stored in Archon DB)
CORS:
- API routes use
WEB_UI_ORIGINto restrict CORS. The default is*(allow all), which is appropriate for local single-developer use. Set a specific origin when exposing the server publicly.
Docker deployments:
CLAUDE_USE_GLOBAL_AUTH=truedoes not work in Docker (no localclaudeCLI). ProvideCLAUDE_CODE_OAUTH_TOKENorCLAUDE_API_KEYexplicitly.- Escape
$as$$in Docker Compose.envfiles to prevent variable substitution of bcrypt hashes.