VixPro AIHome
VixPro AI Logo
AI Safety & Guardrails

What happens if the VixPro AI agent is tampered with or compromised?

The Go Agent uses multi-layer tamper detection that makes unauthorized modifications detectable and self-limiting.

  • At installation — the agent receives cryptographically signed configuration files and public keys via a Trust-On-First-Use (TOFU) handshake. Private keys never touch the customer server
  • At startup — verifies RSA-SHA256 signatures of configuration files. Tampered or unsigned config causes exit with code 2 — systemd will not restart a tampered agent. Recovery requires re-registration
  • At runtime — integrity checker goroutine runs every 5 minutes, re-verifying configuration signatures and checking SHA-256 hashes of pinned public keys. Any modification triggers a critical alert via WebSocket and creates an incident in VixPro AI
  • Key rotation — requires no binary rebuild or reinstall. New keys are signed by the old private key and distributed via WebSocket to all connected agents simultaneously

Ready to get started?

Try the live demo or explore pricing for your team.