LLM-driven agent that has been fed a hostile document or has a buggy manifest.
cannot › Cannot read/write outside cap.fs.*, connect outside cap.net.*, exceed quota, or delegate caps the parent doesn't have.
Linux today layers DAC, capabilities, SELinux, AppArmor. For agent workloads it's the wrong primitive set. Coconut OS makes capability primary and reduces DAC to a legacy compat layer for unmodified binaries.
An agent that was not granted cap.fs.read("/home/maya/.ssh") literally cannot read that path — the syscall returns -ECAPABILITY before reaching the VFS layer. The mechanism is closer to seL4 and Capsicum than to Linux's hybrid capability-over-DAC overlay.
Every agent-relevant event — spawn, capability grant, capability use, capability denial, resource consumption above threshold, exit — appends to a tamper-evident hash chain. On supported hardware the chain is rooted in a TPM-NV-sealed key; on non-TPM hardware a documented software root with stated attack model.
off-by-N between LSM-deny counters and audit-event counters is a P0 release-blocker · NFR-024
LLM-driven agent that has been fed a hostile document or has a buggy manifest.
cannot › Cannot read/write outside cap.fs.*, connect outside cap.net.*, exceed quota, or delegate caps the parent doesn't have.
Adversary who acquires a signing key and pushes a malicious package.
cannot › Cannot ship code running with caps NOT declared in the package metadata; cannot evade signature verification at install + update.
Legacy Linux app via XWayland or DAC compat layer attempting to read agent state.
cannot › Cannot read another agent's audit segment without cap.audit.read; cannot modify past audit events; cannot spawn agents outside agent_spawn.
Adversary on the wire between user and box, or between cluster nodes.
cannot › Cannot decrypt TLS-protected :8443, forge GPG-signed packages, or replay attestation across reboots (TPM-rooted).
Operator with cap.admin.* who turns hostile.
cannot › Cannot tamper with past audit events; cannot sign packages as Coconut Labs / operator-root; cannot remove their own audit footprint.
Out-of-scope classes (physical attack, kernel zero-days, TPM firmware compromise, quantum break of BLAKE3/Ed25519) are listed with mitigation pointers in the full threat model. CVE SLA + key-revocation procedure + Trail of Bits engagement details land with the security drop.