Operate
Operator Guide
Environment variables, repo guardrails, audit, backup, and safe local operation.
Environment variables
HASP_HOMEHASP_MASTER_PASSWORDHASP_BACKUP_PASSPHRASE
Safe local workflow
The preferred local path is:
- import local material with
hasp import - bind a repo with
hasp bootstraporhasp project bind - use
hasp runorhasp mcp - use
hasp injectfor broker-owned file materialization outside the repo - use
hasp write-envonly when the convenience tradeoff is worth it
Repo guardrails
Install git hooks:
make install-hooks
Manual repo scan:
bin/hasp check-repo --project-root /path/to/repo
Audited override:
bin/hasp check-repo --project-root /path/to/repo --allow-managed-secrets
Release trust path
Verify a packaged release before install:
scripts/hasp-verify-release.sh hasp_<version>_<os>_<arch>.tar.gz
scripts/hasp-install-release.sh --verify hasp_<version>_<os>_<arch>.tar.gz
The packaged installer verifies the signed checksum manifest, the tarball signature, and the packaged binary signature before it stages the install tree. The upgrade helper verifies the same release material and stages a new release tree before replacing the installed tree.
Threat-model limits
- HASP reduces accidental exposure and common local leaks on a normal developer machine.
- HASP does not provide strong same-user local isolation.
- HASP does not defend against malicious same-user local processes.
- pasted values and shell exports are still operator hygiene unless you route them through explicit import or capture paths.