Fixpanic
Core Concepts

Security

Understanding the FixPanic security model

Security is a foundational principle in FixPanic. Since agents execute commands on your production infrastructure, we've built multiple layers of protection to keep your systems safe.

Security Philosophy

FixPanic follows the principle of defense in depth:

Command Whitelisting

Only pre-approved commands can be executed by agents.

Safe Commands (Auto-Approved)

These commands are generally safe and allowed by default:

CategoryExamples
Process Infops, top, pgrep
System Infouname, hostname, uptime
Disk Infodf, du, lsblk
Network Infonetstat, ss, ip
Log Readingcat, head, tail, grep (on allowed paths)
Service Statussystemctl status
Container Infodocker ps, docker logs

Restricted Commands (Require Approval)

These commands require explicit human approval:

CategoryExamplesRisk
Service Controlsystemctl restartMedium
Process Controlkill -15Medium
Container Controldocker stopMedium
File Modificationtouch, mkdirMedium

Blocked Commands (Never Allowed)

These commands are never executed, regardless of approval:

CategoryExamplesWhy Blocked
Destructiverm -rf, ddData loss
Privilege Escalationsudo, su, chmod +sSecurity
Shell Escapebash -c, eval, `cmd`Bypass controls
Network Attacknmap, nc -lMalicious use
System Modificationpasswd, useraddUnauthorized access

Shell Operators

Shell operators are blocked to prevent command injection:

OperatorBlocked
| (pipe)Yes
&& (and)Yes
|| (or)Yes
; (sequence)Yes
>, >> (redirect)Yes
< (input redirect)Yes
` (backtick)Yes
$() (command sub)Yes

Path Restrictions

Agents are blocked from accessing sensitive paths:

Blocked Paths

PathReason
/etc/passwdUser information
/etc/shadowPassword hashes
/rootRoot home directory
/home/*/.sshSSH keys
/var/lib/dockerDocker data
~/.awsAWS credentials
~/.kubeKubernetes config

Allowed Paths

PathPurpose
/var/logSystem logs
/tmpTemporary files
/procProcess information
/sysSystem information
Application directoriesYour applications

Resource Limits

Commands are constrained to prevent resource abuse:

LimitDefaultPurpose
Execution Timeout30 secondsPrevent hanging
CPU TimeLimitedPrevent CPU abuse
MemoryLimitedPrevent memory exhaustion
Output Size1 MBPrevent output flooding

Note: These limits can be configured per-cluster for specific use cases. Contact support for custom limits.

Process Isolation

Commands run in isolated environments:

Sandboxing

  • Commands execute in separate processes
  • No shell expansion
  • Clean environment variables
  • Limited file descriptors
  • No network access from commands

Process Tree

Audit Logging

Every action is logged:

Logged Events

EventDetails Captured
Command ExecutionCommand, args, timestamp, user
Approval DecisionApproved/denied, who, when
Connection EventsConnect, disconnect, errors
Configuration ChangesWhat changed, who, when

Audit Log Format

{
  "timestamp": "2024-01-15T10:30:00Z",
  "event_type": "COMMAND_EXECUTED",
  "agent_id": "agent_abc123",
  "cluster_id": "cluster_xyz789",
  "user_id": "user_def456",
  "command": "ps aux",
  "result": "success",
  "execution_time_ms": 150
}

Log Retention

  • Logs retained for 90 days (default)
  • Export available for compliance
  • Extended retention on enterprise plans

Authentication & Authorization

Agent Authentication

Agents authenticate using:

  • Agent ID - Identifies the agent
  • API Key - Secret authentication token
  • Request IDs - Prevent replay attacks
  • Timestamps - Prevent stale requests

User Authentication

Users authenticate via:

  • Email/password
  • OAuth (Google, GitHub)
  • SSO (enterprise)

Authorization Model

RoleCapabilities
OwnerFull access, billing
AdminManage clusters, agents, users
MemberUse chat, view dashboards
ViewerRead-only access

Network Security

Agent Connections

  • Outbound TCP only (agent initiates)
  • TLS encryption
  • Certificate validation
  • No inbound ports required

Platform Infrastructure

  • DDoS protection
  • WAF (Web Application Firewall)
  • Rate limiting
  • IP allowlisting (enterprise)

Human-in-the-Loop

The approval system ensures humans control sensitive actions:

When Approval is Required

  • Commands not on the whitelist
  • Commands affecting services
  • Commands modifying files
  • Any potentially risky operation

Approval Workflow

  1. Agent proposes an action
  2. System pauses and notifies user
  3. User reviews the exact command
  4. User approves or denies
  5. If approved, command executes

See Approvals & Whitelisting for details.

Compliance

FixPanic supports compliance requirements:

StandardSupport
SOC 2Audit controls
GDPRData handling
HIPAAHealthcare data (enterprise)
PCI DSSPayment data (enterprise)

Security Best Practices

For Users

  1. Use strong, unique passwords
  2. Enable two-factor authentication
  3. Review approval requests carefully
  4. Whitelist sparingly
  5. Review audit logs regularly

For Administrators

  1. Use least-privilege principle
  2. Rotate API keys periodically
  3. Monitor for unusual activity
  4. Keep agents updated
  5. Configure alerts for security events

For Organizations

  1. Implement SSO where possible
  2. Define clear access policies
  3. Regular security reviews
  4. Incident response planning
  5. Employee security training

Reporting Security Issues

If you discover a security vulnerability:

  1. Email: [email protected]
  2. Do not disclose publicly
  3. Provide detailed reproduction steps
  4. We'll respond within 24 hours

We have a responsible disclosure program and reward valid reports.

Next Steps

On this page