Local Threat Model

StaticPlay – 2026

1. Scope

This threat model applies to:

It assumes local execution by default and user intent as the primary control surface.

2. Core Assumptions

StaticPlay operates under the following assumptions:

If these assumptions are violated, responsibility shifts to the environment, not the software.

3. In-Scope Threats (What We Consider)

3.1 Local System Compromise

Threat: Malware, rootkits, or compromised OS environments affecting AI execution.

Mitigation:

Residual Risk: High — local compromise cannot be solved at application level.

3.2 Malicious or Untrusted Models

Threat: Third-party models containing malicious code, unsafe weights, or unexpected behaviour.

Mitigation:

Residual Risk: Medium — user discretion is required.

3.3 Data Leakage

Threat: User prompts, images, or outputs leaking to third parties.

Mitigation:

Residual Risk: Low — leakage requires external user action.

3.4 Misuse of Generated Content

Threat: User generates unlawful, harmful, or misleading content.

Mitigation:

Residual Risk: High — content responsibility rests with the user.

3.5 Resource Exhaustion

Threat: Excessive CPU, GPU, RAM, or disk usage impacting system stability.

Mitigation:

Residual Risk: Medium — inherent to compute-heavy workloads.

3.6 Supply Chain Risks

Threat: Compromised dependencies, installers, or third-party libraries.

Mitigation:

Residual Risk: Medium — shared across all modern software ecosystems.

4. Out-of-Scope Threats (What We Do NOT Claim to Solve)

StaticPlay does not attempt to mitigate:

Claiming otherwise would be dishonest.

5. Trust Boundaries

[ User Intent ]
      |
      v
[ StaticPlay UI ]
      |
      v
[ Local Execution Environment ]
      |
      v
[ User-Owned Outputs ]

StaticPlay does not cross trust boundaries without user action.

6. Design Philosophy

7. Legal & Compliance Context

This threat model aligns with:

StaticPlay provides tools, not outcomes.

8. Summary

StaticPlay is secure by being:

The safest data is data never collected.

The safest execution is execution the user controls.