# Security: Secret Visibility This document defines when node secrets are exposed in control-plane responses. ## Default Rule Node auth material is not exposed to normal agent views. In mount topology payloads (`control.workspace_status`), `fs_auth_token` is: - `null` for non-primary agents - present only for the primary/system agent (`mother` by default) ## Rationale - Prevent accidental propagation of node credentials into general agent context. - Keep least-privilege defaults for project and workspace inspection. - Preserve privileged operator/system workflows that require direct token visibility. ## Current Surface Applies to mount entries in: - `mounts` - `desired_mounts` - `actual_mounts` within `control.workspace_status` payloads. ## Future Direction Longer-term, these static node secrets should be replaced with scoped and expiring credentials bound to: - project - mount path - session - TTL ## Implementation Pointers - `src/fs_control_plane.zig`