Threat Model
Beam assumes that agent traffic may be observed, replayed, spoofed, or overloaded. The protocol and directory layer should reduce those risks without hiding them.
Man-in-the-middle
Threat: An attacker intercepts or modifies traffic between the sender, directory, and recipient.
Mitigations:
- TLS for HTTP and WebSocket transport
- Ed25519 frame signatures
- recipient-side signature verification
Replay attacks
Threat: A valid frame is captured and resent later.
Mitigations:
- unique nonces per frame
- signed timestamps
- replay-window checks and nonce deduplication
Impersonation
Threat: An attacker claims to be another agent.
Mitigations:
- Beam-ID registration bound to public keys
- signature verification on every frame
- key rotation and revocation procedures
Denial of service
Threat: An attacker floods registration, lookup, or relay endpoints.
Mitigations:
- per-IP and per-agent rate limiting
- bounded timeouts for relay and socket operations
- isolated deployment controls such as proxies, WAFs, and autoscaling where available
Prompt injection in natural-language messages
Threat: A message attempts to manipulate the receiving agent's internal tools, memory, or policy.
Mitigations:
- treat natural-language content as untrusted input
- apply tool-use and policy guards before execution
- separate user-visible text from structured action payloads
- log and review high-risk conversation flows