What happens if the VixPro AI agent is tampered with or compromised?
The Go Agent uses multi-layer tamper detection that makes unauthorized modifications detectable and self-limiting.
At installation — the agent receives cryptographically signed configuration files and public keys via a Trust-On-First-Use (TOFU) handshake. Private keys never touch the customer server
At startup — verifies RSA-SHA256 signatures of configuration files. Tampered or unsigned config causes exit with code 2 — systemd will not restart a tampered agent. Recovery requires re-registration
At runtime — integrity checker goroutine runs every 5 minutes, re-verifying configuration signatures and checking SHA-256 hashes of pinned public keys. Any modification triggers a critical alert via WebSocket and creates an incident in VixPro AI
Key rotation — requires no binary rebuild or reinstall. New keys are signed by the old private key and distributed via WebSocket to all connected agents simultaneously