This page is a design/reference spec. Release truth lives in the runtime capability manifest and shipped product docs.
Security and Privacy Model
Owner: PhantomPM Security Team
Last Updated: 2026-02-13
Status: Beta
Security Posture
PHANTOM defaults to local-first operation and explicit control of external actions.
Current Implementation State
- local config storage exists
- permission level field exists in config
- no fully enforced encryption/keychain/audit system yet
Target State
- encrypted sensitive data at rest
- OS keychain-backed secret storage
- enforceable action permission policies
- structured local audit log
Data Classification
- public/non-sensitive metadata
- project-sensitive context data
- credentials/secrets
Control Requirements
- credentials stored in keychain abstraction
- context store access constrained to explicit paths
- external integrations require explicit consent
- secure defaults on first run
Threat Model (v1)
Primary concerns:
- accidental leakage via logs or external calls
- local credential exposure
- over-privileged integrations
Mitigations:
- redaction in logs
- least-privilege integration scopes
- explicit opt-in for external features
Claims Policy
No public claim of completed encryption/keychain protections without implementation and tests.
Acceptance Criteria
- security-sensitive docs match implementation state
- all secret-handling paths have clear storage behavior
- permission model documented and testable