Operate
Operator Guide
Environment variables, repo guardrails, audit, backup, and safe local operation.
Environment variables
HASP_HOMEHASP_MASTER_PASSWORDHASP_BACKUP_PASSPHRASE
Safe local workflow
The preferred local path is:
- import local material with
hasp import - bind a repo with
hasp bootstraporhasp project bind - use
hasp runorhasp mcp - use
hasp injectfor broker-owned file materialization outside the repo - use
hasp write-envonly when the convenience tradeoff is worth it
Repo guardrails
Install git hooks:
make install-hooks
Manual repo scan:
bin/hasp check-repo --project-root /path/to/repo
Audited override:
bin/hasp check-repo --project-root /path/to/repo --allow-managed-secrets
Release trust path
Verify a packaged release before install:
scripts/hasp-verify-release.sh hasp_<version>_<os>_<arch>.tar.gz
scripts/hasp-install-release.sh --verify hasp_<version>_<os>_<arch>.tar.gz
The packaged installer verifies the signed checksum manifest, the tarball signature, and the packaged binary signature before it stages the install tree.
Threat-model limits
- HASP reduces accidental exposure and common local leaks on a normal developer machine.
- HASP does not provide strong same-user local isolation.
- HASP does not defend against malicious same-user local processes.
- pasted values and shell exports are still operator hygiene unless you route them through explicit import or capture paths.