ops0ops0

Safety & Security

How Hive keeps your servers safe while providing powerful AI-driven management.

Three-Tier Command Safety

Hive categorizes every command into three safety levels:

Safe
Run automatically without asking
!
Needs Approval
You must approve before execution
Blocked
Never executed under any circumstance

Command Categories

Safe Commands (Auto-Run)

These read-only commands run automatically:

CategoryCommands
System Infouname, hostname, uptime, date, whoami
Process Viewingps, top, htop, pgrep
File Listingls, find, locate, tree
File Readingcat, head, tail, less, grep
Disk Infodf, du, lsblk
Memory Infofree, vmstat
Network Infonetstat, ss, ip addr, ping, dig, nslookup
Service Statussystemctl status, service status
Log Readingjournalctl, reading log files

Commands Requiring Approval

These commands ask for your permission:

CategoryCommands
Service Managementsystemctl restart, systemctl stop, service restart
Process Controlkill, pkill, killall
Package Managementapt install, yum install, npm install
File Modificationvim, nano, sed -i, mv, cp
Configuration ChangesEditing config files
Network Changesiptables, firewall rules
User Managementuseradd, usermod, passwd

Blocked Commands (Never Executed)

These dangerous operations are blocked entirely:

rm -rf /Recursive delete of system directories

shutdown, reboot Without explicit request

mkfs, fdisk Disk formatting

:(){:|:&};Fork bombs and resource exhaustion
curl | bashDownloading and executing remote scripts
/etc/shadowPassword/shadow file access

Approval Workflow

When Hive needs to run a command that could change your system:

You:"Restart nginx"
Hive: I'll restart the nginx service for you.
⚠️ APPROVAL REQUIRED
Command: systemctl restart nginx
Impact: Web server will briefly go offline (~2-5 seconds)
ApproveReject

You're Always in Control

See Every Command
View the exact command before any risky action is taken.
Approve or Reject
You decide whether to proceed with system changes.
Cancel Anytime
Stop operations at any point during execution.
Full Audit Log
Complete record of all actions for compliance.

Network Security

Outbound-Only Connections

No Inbound Ports Required

The Hive agent only makes outbound HTTPS connections. Your servers never expose inbound ports, eliminating a major attack surface.

Encrypted Communication

LayerProtection
TransportTLS 1.2+ encryption for all connections
AuthenticationAPI key authentication per agent
AuthorizationRole-based access control (RBAC)

Firewall Friendly

  • Works through NAT and corporate firewalls
  • No VPN required
  • No SSH port exposure needed

Access Control

Role-Based Permissions

RoleCapabilities
ViewerView server status, read logs
OperatorRun diagnostic commands, AI chat
AdminApprove changes, manage agents
OwnerFull access, manage team members

Team Collaboration

  • All team members can use AI Chat
  • Actions are logged per user
  • Audit trail for compliance

Audit Logging

Every action is logged with:

FieldDescription
TimestampWhen the action occurred
UserWho initiated the action
AgentWhich server was affected
CommandExact command executed
OutputCommand result
ApprovalWho approved (if required)
Example Audit Entry:

2024-01-15 14:32:18 | john@company.com
Agent: production-web-01
Command: systemctl restart nginx
Status: Approved & Executed
Approved by: john@company.com


FAQ

Can Hive break my server?

Hive has multiple safety guards. Dangerous commands are blocked, and risky ones require your explicit approval.

Can Hive access my files?

Hive can read files to help troubleshoot, but it will ask approval before modifying anything.

What if Hive suggests something wrong?

You always approve changes before they happen. You can reject any suggestion without consequence.

Is my data secure?

All connections are encrypted (TLS 1.2+), and your servers never expose inbound ports.


Best Practices

Security Recommendations
Review approvals carefully - Understand what each command does before approving
Use role-based access - Grant minimum necessary permissions to team members
Monitor audit logs - Regularly review actions taken on your servers
Keep agents updated - Install security updates when available
Rotate API keys - Periodically regenerate agent API keys