Threat model
Terminal output, secrets, sockets, clipboard, paths, and network connections are treated as sensitive.
Cocxy Terminal
Local secrets, signed updates, encrypted stores, hardened runtime, and explicit network actions.
Terminal output, secrets, sockets, clipboard, paths, and network connections are treated as sensitive.
AES-GCM protects Vault records, EdDSA signs Sparkle updates, HMAC-SHA256 protects relay auth, and Keychain stores secrets.
Public releases use Developer ID Application signing, hardened runtime, secure timestamp, and Apple notarization.
Swift and Apple frameworks are the default, Sparkle is audited, Zig dependencies are pinned, and npm is limited to web tooling.
The public SBOM is linked with release artifacts when the release flow produces it.
Report vulnerabilities through GitHub Security Advisory or dev@cocxy.dev.
Download
The site keeps version placeholders so the release workflow can rewrite them when publishing.
Direct download from GitHub Releases.
Download v1.18.0Reproducible install from the official tap.
brew tap salp2403/tap && brew install --cask cocxy
Stable, preview, and nightly are documented with clear risk levels.
View channels