Enable Fortress Mode
What Fortress Mode enables
| Feature | Description |
|---|---|
| macOS Keychain storage | Vault passphrase stored in Keychain — no interactive prompt on startup |
| Buffer zeroing | Secret values zeroed in memory immediately after use |
| SQLite hardening | WAL mode enabled, integrity checks on startup |
| OS exclusions | ~/.genosv1/ excluded from Spotlight indexing and Time Machine backups |
| Vault auto-lock | Vault locks after 30 minutes of inactivity |
| Rate limiting | Gateway endpoints rate-limited to prevent brute-force attacks |
Fortress Mode is idempotent — running it multiple times is safe. It checks current state and only applies what is not already enabled.
Autonomous doctor
The autonomous doctor engine runs 7 automated security checks and can auto-fix common misconfigurations.exec/spawn calls, eval usage, crypto-mining patterns, data exfiltration, environment harvesting, and obfuscated code.
WebAuthn / Touch ID
GenosOS supports biometric authentication for gateway access using WebAuthn (Touch ID on macOS).
The agent triggers the WebAuthn overlay on demand — you never need to navigate to a settings panel.
DM policies
DM policies control which external senders can reach the agent. Configure per-channel through conversation.| Policy | Behavior |
|---|---|
pairing | Default. Unknown senders receive an 8-character alphanumeric code. Message not processed until approved. |
open | Anyone can message. Also set allowFrom: ["*"] to allow all senders. |
closed | No new DMs accepted from unknown senders. |