Security binaries deliver emergency response controls, integrity verification, and authentication lifecycle management as a coordinated defense stack for Kodachi deployments.
health-control provides the emergency toolkit for fast containment, network shutdown controls, secure wiping, and system recovery workflows.
213 Commands4 Response LevelsSub-Second Triggers
Trust and Verification Layer
Trust
integrity-check and online-auth enforce baseline trust via cryptographic validation, authenticated sessions, and heartbeat-based service authorization.
27 CommandsSession Keep-AliveAuth Chain Ready
Documentation Navigation
Navigate the documentation:
Quick Start - Installation guide and getting started
Enterprise-Grade Security and Authentication Infrastructure
The security tools in Kodachi OS provide comprehensive protection through multi-layered defense mechanisms, emergency response capabilities, and continuous system integrity monitoring. These production-ready binaries form the backbone of system security, offering everything from panic modes to cryptographic verification.
Core Architecture Principles - Verified
Defense in Depth: Multiple layers of security from authentication to emergency response
Zero-Trust Authentication: Comprehensive auth system with heartbeat monitoring
Forensic Resistance: Multi-pass secure wiping, memory cleaning, emergency data destruction
Continuous Verification: Real-time integrity monitoring and compliance checking
Heartbeat maintenance: Auto-maintained with --keep-alive flag
Service usage: Authenticated services verify automatically
Session termination: online-auth logout
Emergency Response Levels
Note: All panic modes are manually triggered via commands. There is no automatic detection or escalation.
Level
Manual Trigger Command
Actions
Recovery
Soft
panic-soft
Network termination + screen lock
Manual recovery
Medium
panic-medium
Network + process termination + memory clearing
Recovery mode
Hard
panic-hard
Network + process + RAM wipe + immediate shutdown
Full system restart
Destroy
panic-destroy
Hard panic + LUKS header destruction
Data unrecoverable
Data Destruction Standards
Pattern
Passes
Standard
Use Case
DoD 5220.22-M
3
US Military
General sensitive data
Gutmann
35
Maximum security
Highly classified
Random
1-7
Configurable
Quick wipe
Zeros
1
Fast wipe
Non-sensitive
Integration Points
The security tools integrate seamlessly with:
Integration Type
Services/Systems
Network Services
tor-switch, routing-switch, dns-switch
System Services
logs-hook, permission-guard
Infrastructure
global-launcher, deps-checker
Kernel Modules
Security frameworks, audit system
Hardware
TPM, hardware RNG, secure boot
Security Considerations
Important Security Notice
These tools provide powerful capabilities that should be used responsibly. Emergency response features can cause data loss and system unavailability. Always maintain secure backups and test emergency procedures in controlled environments.
Best Practices
Practice
Description
Regular Verification
Run integrity checks daily
Emergency Preparedness
Test panic modes quarterly
Authentication Management
Rotate credentials regularly
Audit Review
Check logs weekly
Update Policies
Keep security policies current
Compliance Features
Feature
Description
Audit Trails
Complete logging of all operations
Forensic Readiness
Evidence preservation capabilities
Regulatory Support
Configurable retention policies
Incident Response
Automated response procedures
Troubleshooting
Common Issues
Issue
Solution
Prevention
Authentication failure
Check network, verify credentials
Use keep-alive mode
Integrity check fails
Review changes, update baseline
Regular updates
Panic mode triggered
Follow recovery procedure
Configure thresholds
Kill switch stuck
Use force recovery
Test regularly
Recovery Procedures
# Recover from soft panicsudohealth-controlpanic-recover
# Restore network after kill switchsudohealth-controlrecover-internet
# Reset authenticationsudoonline-authlogoutsudoonline-authauthenticate--relogin