Security Case Studies

Real incidents analyzed through Mentat's zero trust model. Each case study is honest about what the platform prevents and what it does not.

Two Types of Isolation

These cases demonstrate two distinct security boundaries that Mentat enforces:

Build-time isolationImmutable overlayfs bases prevent supply chain attacks from reaching the deploy. Dependencies are locked at base build time. No npm install at deploy = no postinstall hooks = no RAT.
Runtime isolationSandbox-per-tenant with PID + mount namespaces, pivot_root, and scoped credentials prevents a breach in one tenant from reaching others. The kernel enforces what application logic fails to protect.
In-container hardening (Hull)Running on the Hull driver adds seccomp-bpf syscall allowlists, Landlock filesystem restrictions, and optional --rootless NEWUSER mapping. These layers stop an attacker from doing things even after they have code execution inside the container — not just from seeing the host.