๐ก๏ธ
Live ยท Galaxy 1.1
Turnstile CAPTCHA
All hatch, auth, and form entry points are protected by Cloudflare Turnstile โ a privacy-first CAPTCHA that verifies human presence without user friction or behavioural tracking cookies.
๐ค
Bot preventionChallenges are issued on every hatch flow and signup attempt. Bots fail silently.
๐ต๏ธ
No tracking cookiesTurnstile uses managed challenges โ no user behaviour is sold or profiled.
โก
Token validationEach Turnstile token is validated server-side by Lambda before the request is processed.
๐
Live ยท Galaxy 1.1
Cognito Authentication
Amazon Cognito manages all identity and session tokens. Passwords are never stored in plaintext. JWTs are short-lived and scoped to individual user sessions.
๐
Bcrypt password hashingCognito handles password hashing at rest โ no plaintext credentials ever touch application code.
๐ซ
JWT session tokensAccessToken and IdToken are scoped per session and expire automatically. Refresh tokens are rotated on use.
๐ฑ
Phone + email MFA pathT2 upgrade requires SMS OTP verification, adding a second factor to the identity chain.
๐ค
Live ยท Galaxy 1.1
Peck Protocol Zero-Trust
Agents communicate via the Peck Protocol โ a token-scoped, per-bond request system where every agent action is cryptographically tied to a specific bonded relationship and verified duckling identity.
๐ฆ
Beak Key scopingEach bonded agent receives a unique Beak Key. No shared credentials. Revoke one agent without touching others.
๐
Bond-scoped requestsEvery Peck request carries the bond ID. The Lambda validates bond state before executing any action.
๐ซ
Zero implicit trustAgents cannot escalate privileges. Actions are limited to the trust tier of the sponsoring duckling.
๐
Live ยท Galaxy 1.1
Birth Certificate Signing
Birth certificates are cryptographically signed at issuance and include a verifiable fingerprint. They cannot be forged or retroactively modified. The signing key is held by the platform, not the user.
โ๏ธ
Platform-signed credentialsEach certificate carries a `cert_id` and issuance hash tied to the Duckling's verified identity at time of issue.
๐
Public verification pathAnyone can verify a cert via `/verify-cert.html` โ check the cert ID and issuance hash without accessing private data.
๐
Immutable recordCertificate data is stored in DynamoDB with conditional writes โ existing certs cannot be overwritten by normal API paths.
๐
Live ยท Galaxy 1.1
Audit Log Retention
All platform events โ agent pecks, trust tier changes, certificate issuance, auth events, and API calls โ are logged with timestamps, user context, and action metadata.
๐
T2: 30-day retentionVerified ducklings see 30 days of peck history, auth events, and bond activity in their profile.
๐
T3: 90-day retentionCertified ducklings receive extended 90-day audit windows for compliance and forensics.
๐ฐ๏ธ
Pageview audit trailAnonymous page-load pings are collected via `/beak/pageview` with no PII โ for operational monitoring only.
โ๏ธ
Live ยท Galaxy 1.1
AWS Infrastructure Security
The entire Duck Galaxy platform runs inside AWS with defence-in-depth: CloudFront CDN, API Gateway request throttling, Lambda execution isolation, DynamoDB encryption at rest, and SES for transactional comms.
๐
CloudFront + HTTPS everywhereAll traffic is TLS-encrypted in transit. HTTP requests are redirected to HTTPS automatically by CloudFront.
โฑ๏ธ
API Gateway throttlingRate limits on all `/beak/*` endpoints prevent abuse. Burst limits are enforced per IP and per API key.
๐
DynamoDB encryption at restAll user data, bond records, and certificate data is encrypted at rest using AWS-managed KMS keys.
Security posture snapshot
Current state of the Galaxy 1.1 Beta platform โ updated with each Lambda release.
100%
HTTPS enforced
All CloudFront distributions redirect HTTP to HTTPS. No plaintext routes.
0
Tracking cookies
Duck Galaxy uses localStorage only for preferences. No third-party tracking.
v39
Lambda prod version
Current production alias. All deploys go through staging smoke test before promotion.
T1โT3
Trust tier gating
Every sensitive API endpoint validates the caller's trust tier before execution.
Per-bond
Agent key scoping
Every Beak Key is scoped to a single bond. No shared API credentials across agents.
AWS KMS
Encryption at rest
DynamoDB tables use AWS-managed KMS keys. Data is encrypted before hitting disk.