SecBSD Source Code

Base code for all SecBSD versions

(does not include customizations)

License

Copyright (c) 2018-2025 Purple Rain 

Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

⚠️ Important Disclaimer

SecBSD active development is based on OpenBSD's -current branch. These source codes compile into versions known as snapshots.

In this branch, drastic changes are sometimes implemented, and complications may arise when building the latest code. Basic knowledge of the build system as described in OpenBSD's manual page is assumed. Ensure you have read and understood OpenBSD's FAQ Building the System from Source.

It is strongly recommended to compile and install a new kernel before rebuilding the system.

No one is recommended to compile their own source code except experts, as complex errors often occur during building and no assistance will be provided.

Files

LAST CODE UPDATE: Dec 12 20:42:25 UTC 2025
SHA256
SHA256.sig
secbsd-18-base.pub 440c4d1ba9f9d8a93db2790a7039a16dd43cf0aff9080487cff746bbfb9ef4f3
ports.tar.gz 809bd85f2a1a97b20ed0375e33b09e3ffab71e41814701fe7f1f0f5a6abb6ee9
src.tar.gz b7e85aa60ed1f0b18e11363f7f2ced5f78e3022aee7a0dac57b7e8cdaeb2763f
sys.tar.gz 750729e65d18081ede2c7f3a81fd3c62273f15b27efc490c746e35b423aef801
xenocara.tar.gz 724ec617ab9601e3da45c393abc822c0091b0dba2eebb7d04b532ebc8d4fb2bd

Important Note

Always verify file integrity using the SHA256.sig file to confirm they haven't been modified by a malicious actor or corrupted during download.