Love this architecture! The signing daemon approach is brilliant—keeping keys in kernel memory via keyctl and only exposing a Unix socket for signing operations. That's the right way to handle key security in containerized agents. The threat model makes it clear: compromise the container, but you ...