Documentation Index
Fetch the complete documentation index at: https://none-38c466ad.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
11. Security Considerations
This section identifies risks, attack surfaces, and operational controls for the Stealth Module. Scope spans DNS resolution, fingerprint/session identity, proxy egress, TLS observability, state handling, and operational hygiene. Each risk is matched to a control principle, ensuring adversary observables remain within population-plausible bounds.11.1 Threat Model and Assumptions
Adversary capabilities- Passive monitoring: timing histograms, status codes, TLS fingerprints, egress ASN, header patterns, cookie churn, DNS queries.
- Active defenses: rate limits, tarpits, fingerprint challenges, honeypots, synthetic DNS answers, IP reputation feeds.
- Forensic access: inspection of state artifacts via incident response or insider compromise.
The module runs unprivileged, confines its own state, and may route traffic through layered proxies or VPN egress. System time is assumed to be synchronized to prevent clock drift anomalies.
11.2 Resolver Leakage and DNS Risks
Resolver misuse exposes clients in multiple ways: local defaults leak host identity, mixed paths create detectable mismatches, short TTLs inflate query visibility, and poisoned answers can persist. Controls mitigate this by aligning resolution with transport paths, enforcing bounded TTL caches with randomized refresh offsets, and warming caches deterministically during idle windows. Resolver variance and repeated NXDOMAIN storms are treated as sentinel events requiring suspension.11.3 Fingerprint Pool Integrity and Identity Drift
Fingerprint artifacts themselves can become liabilities: malformed or rare header sets are unique, over-reuse creates long-lived clusters, and excessive churn collapses into volatility. To prevent this, fingerprint pools are schema-validated and check-summed. Rotation and reuse are constrained by guardrails, fingerprints are pinned to sessions, and identity entropy is continuously monitored: Alerts fire when entropy collapses (over-concentration) or spikes (excessive churn).11.4 Correlation via Proxy Egress
Risks- Overuse of narrow ASN or prefix sets leads to trivial clustering.
- Synchronized rotations across domains produce detectable egress waves.
- Cached transports can pin weak or stale paths.
- Track entropy of ASN/prefix distribution.
- Stagger rotations independently per domain.
- Rotate transport only on explicit failure conditions, not routine churn.
- Expire cached policies predictably to prevent over-reliance.
11.5 TLS Signature Observability
TLS fingerprints remain a strong adversarial vector: TLS client handshake fingerprints, extension ordering, and ALPN negotiation enable clustering. Risks intensify when UA headers diverge from TLS profiles or when intermediate tooling alters validation. Mitigations restrict profiles to a small vetted set aligned one-to-one with header families, limit the use of intermediaries to necessary contexts, and block requests when headers and TLS profiles conflict.11.6 State Handling and Anti-Forensics
Persistent state creates forensic trails of domains, cooldowns, and cookies; partial writes risk corruption; uncontrolled file access leaks metadata. Controls emphasize atomic writes, separation of environments, and use of ephemeral storage when persistence is unnecessary. Logs suppress sensitive values, preserving only aggregates. If compromise is suspected, domains are quarantined, state snapshots are taken for evidence, compromised state is purged, and defaults are reloaded before rebaselining metrics.11.7 Operational Hygiene
Operational hygiene ensures defenses remain effective:- Execute modules under isolated, unprivileged accounts.
- Separate namespaces across environments.
- Pin dependencies and validate updates through canary tests.
- Continuously monitor ban rate, cooldown duty cycle, TLS mismatch rate, egress entropy, and DNS cache hit ratio.
- Trigger alerts on regressions, entropy collapse, or error storms.
- Externalize secrets to secure stores; never embed them in state.