audit notes work completed, test fixes work (95% done), new sprints, new data sources setup and configuration
This commit is contained in:
@@ -0,0 +1,44 @@
|
||||
# Sprint 20260112-001-DOCS - Audit Evidence Pack Gap Closure
|
||||
|
||||
## Topic & Scope
|
||||
- Publish missing evidence pack and audit bundle schemas to close broken references and unblock implementation work.
|
||||
- Align evidence-pack documentation, export-center docs, and high-level positioning with the audit-ready evidence pack advisory.
|
||||
- Evidence to produce: new schema JSON files and updated docs under `docs/modules/evidence-locker/`, `docs/modules/export-center/`, `docs/key-features.md`, and `docs/07_HIGH_LEVEL_ARCHITECTURE.md`.
|
||||
- **Working directory:** `docs/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No upstream sprints required; this sprint defines schemas used by SPRINT_20260112_002_EVIDENCE and SPRINT_20260112_003_EXPORT.
|
||||
- Concurrency: safe to run in parallel with code sprints, but schema changes should land first.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/evidence-locker/architecture.md`
|
||||
- `docs/modules/evidence-locker/evidence-bundle-v1.md`
|
||||
- `docs/modules/evidence-locker/export-format.md`
|
||||
- `docs/modules/export-center/architecture.md`
|
||||
- `docs/product/advisories/`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCS-CEPACK-001 | DONE | Schema requirements review with EvidenceLocker + Export Center | Docs Guild / EvidenceLocker Guild | Create `docs/modules/evidence-locker/schemas/stellaops-evidence-pack.v1.schema.json` and `docs/modules/evidence-locker/schemas/audit-bundle-index.schema.json` with deterministic fields for manifest inventory, transparency references, and timestamp metadata. |
|
||||
| 2 | DOCS-CEPACK-002 | DONE | After DOCS-CEPACK-001 | Docs Guild | Update `docs/modules/evidence-locker/guides/evidence-pack-schema.md` to reference the new schemas, add ASCII-only examples, and record ordering rules. |
|
||||
| 3 | DOCS-CEPACK-003 | DONE | After DOCS-CEPACK-001 | Docs Guild / Export Center Guild | Update `docs/modules/export-center/architecture.md` and `docs/modules/export-center/overview.md` to reference the audit bundle index schema and evidence pack outputs. |
|
||||
| 4 | DOCS-CEPACK-004 | DONE | After DOCS-CEPACK-002 | Docs Guild | Update `docs/key-features.md` and `docs/07_HIGH_LEVEL_ARCHITECTURE.md` with audit-ready evidence pack positioning and links to EvidenceLocker docs. |
|
||||
| 5 | DOCS-CEPACK-005 | DONE | After DOCS-CEPACK-004 | Docs Guild | Archive the 14-Jan-2026 advisory by moving it from `docs/product/advisories/` to `docs-archived/product/advisories/` and add a short archive note in the destination. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; scope covers evidence pack schema and documentation alignment. | Planning |
|
||||
| 2026-01-14 | Published evidence pack schemas, updated docs, and archived the advisory. | Docs Guild |
|
||||
|
||||
## Decisions & Risks
|
||||
- Schema field naming for transparency and timestamp metadata must align with EvidenceLocker and Export Center implementations to avoid contract drift.
|
||||
- High-level positioning updates must stay consistent with existing audit and offline evidence messaging.
|
||||
- Updated schema references: `docs/modules/evidence-locker/schemas/stellaops-evidence-pack.v1.schema.json` and `docs/modules/evidence-locker/schemas/audit-bundle-index.schema.json`.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Schema review with EvidenceLocker and Export Center guilds.
|
||||
@@ -0,0 +1,44 @@
|
||||
# Sprint 20260112-002-EVIDENCE - EvidenceLocker Audit Pack Hardening
|
||||
|
||||
## Topic & Scope
|
||||
- Extend EvidenceLocker bundle metadata and manifests with transparency and RFC3161 timestamp references aligned to the new evidence pack schemas.
|
||||
- Add explicit object-lock configuration and enforcement in S3 storage to support WORM retention and legal hold behavior.
|
||||
- Evidence to produce: code and tests under `src/EvidenceLocker/StellaOps.EvidenceLocker` plus updated EvidenceLocker AGENTS entries.
|
||||
- **Working directory:** `src/EvidenceLocker/StellaOps.EvidenceLocker`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on SPRINT_20260112_001_DOCS for schema definitions and documentation alignment.
|
||||
- Concurrency: implementation can proceed in parallel after schema field names are finalized.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/evidence-locker/architecture.md`
|
||||
- `docs/modules/evidence-locker/export-format.md`
|
||||
- `docs/modules/evidence-locker/bundle-packaging.md`
|
||||
- `docs/modules/evidence-locker/attestation-contract.md`
|
||||
- `docs/modules/attestor/transparency.md`
|
||||
- `src/EvidenceLocker/AGENTS.md`
|
||||
- `src/EvidenceLocker/StellaOps.EvidenceLocker/AGENTS.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EVID-CEPACK-001 | TODO | After DOCS-CEPACK-001 schema fields are final | EvidenceLocker Guild | Update EvidenceLocker manifest models and builders to record transparency and timestamp references in bundle metadata (align with `docs/modules/evidence-locker/schemas/bundle.manifest.schema.json` and the new evidence pack schema). Touch: `src/EvidenceLocker/StellaOps.EvidenceLocker/StellaOps.EvidenceLocker.Infrastructure/Builders/EvidenceBundleBuilder.cs` and related domain models. |
|
||||
| 2 | EVID-CEPACK-002 | TODO | After EVID-CEPACK-001 | EvidenceLocker Guild | Propagate RFC3161 timestamp metadata from signing to bundle packaging and verification flows; add unit tests under `src/EvidenceLocker/StellaOps.EvidenceLocker/StellaOps.EvidenceLocker.Tests`. |
|
||||
| 3 | EVID-CEPACK-003 | TODO | After DOCS-CEPACK-001 schema fields are final | EvidenceLocker Guild | Add Object Lock configuration to `EvidenceLockerOptions` and enforce retention/legal hold headers in `S3EvidenceObjectStore`; validate config at startup and add tests. |
|
||||
| 4 | EVID-CEPACK-004 | TODO | After EVID-CEPACK-001 | EvidenceLocker Guild / QA | Add determinism and schema evolution tests covering new manifest fields and checksum ordering (use existing EvidenceLocker test suites). |
|
||||
| 5 | EVID-CEPACK-005 | TODO | After EVID-CEPACK-003 | EvidenceLocker Guild | Update `src/EvidenceLocker/AGENTS.md` and `src/EvidenceLocker/StellaOps.EvidenceLocker/AGENTS.md` to include object-lock and transparency/timestamp requirements. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; focuses on EvidenceLocker metadata, object-lock enforcement, and tests. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Object Lock semantics (governance vs compliance) require a single default and may need explicit approval from platform governance.
|
||||
- Doc updates to EvidenceLocker packaging and verification guides must be coordinated with the docs sprint to avoid cross-module drift.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-20: EvidenceLocker schema and Object Lock design review.
|
||||
@@ -1,161 +0,0 @@
|
||||
# Sprint 20260112_003_BE - C# Audit Pending Apply
|
||||
|
||||
## Topic & Scope
|
||||
- Convert approved pending APPLY findings into remediation work across modules.
|
||||
- Prioritize security, maintainability, and quality hotlists, then close production test and reuse gaps.
|
||||
- Execute the remaining TODO APPLY backlog from the audit report and update the archived trackers.
|
||||
- Pending APPLY status at sprint start: 107 DONE (waived/applied/revalidated), 851 TODO.
|
||||
- **Working directory:** .; evidence: APPLY closures, test additions, and updated audit status.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on archived audit report and maint/tests tracker in `docs-archived/implplan/2025-12-29-csproj-audit/`.
|
||||
- Parallel execution is safe by module ownership; coordinate shared library changes.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/code-of-conduct/TESTING_PRACTICES.md
|
||||
- docs-archived/implplan/2025-12-29-csproj-audit/SPRINT_20251229_049_BE_csproj_audit_report.md
|
||||
- docs-archived/implplan/2025-12-29-csproj-audit/SPRINT_20251229_049_BE_csproj_audit_maint_tests.md
|
||||
- Module dossiers for affected projects (docs/modules/<module>/architecture.md).
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | AUDIT-HOTLIST-SCANNER-LANG-DOTNET-0001 | DONE | Applied 2026-01-12 | Guild - Scanner | Remediate hotlist findings for `src/Scanner/__Libraries/StellaOps.Scanner.Analyzers.Lang.DotNet/StellaOps.Scanner.Analyzers.Lang.DotNet.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 2 | AUDIT-HOTLIST-SCANNER-CONTRACTS-0001 | DONE | Applied 2026-01-12 | Guild - Scanner | Remediate hotlist findings for `src/Scanner/__Libraries/StellaOps.Scanner.Contracts/StellaOps.Scanner.Contracts.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 3 | AUDIT-HOTLIST-CLI-0001 | BLOCKED | Blocked: CLI tests under active edit; avoid touching other agent work | Guild - CLI | Remediate hotlist findings for `src/Cli/StellaOps.Cli/StellaOps.Cli.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 4 | AUDIT-HOTLIST-EXPORTCENTER-WEBSERVICE-0001 | DONE | Applied 2026-01-13; tests added and tracker updated | Guild - ExportCenter | Remediate hotlist findings for `src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.WebService/StellaOps.ExportCenter.WebService.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 5 | AUDIT-HOTLIST-POLICY-ENGINE-0001 | DONE | Applied 2026-01-13; determinism DI, options binding, auth, tests | Guild - Policy | Remediate hotlist findings for `src/Policy/StellaOps.Policy.Engine/StellaOps.Policy.Engine.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 6 | AUDIT-HOTLIST-SCANNER-NATIVE-0001 | DONE | Applied 2026-01-13; tracker updated | Guild - Scanner | Remediate hotlist findings for `src/Scanner/StellaOps.Scanner.Analyzers.Native/StellaOps.Scanner.Analyzers.Native.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 7 | AUDIT-HOTLIST-SCANNER-WEBSERVICE-0001 | DONE | Applied 2026-01-13; Hotlist S2/M2/Q2 | Guild - Scanner | Remediate hotlist findings for `src/Scanner/StellaOps.Scanner.WebService/StellaOps.Scanner.WebService.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 8 | AUDIT-HOTLIST-EXPORTCENTER-CORE-0001 | DOING | In progress 2026-01-13; Hotlist S2/M2/Q1 | Guild - ExportCenter | Remediate hotlist findings for `src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.Core/StellaOps.ExportCenter.Core.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 9 | AUDIT-HOTLIST-SIGNALS-0001 | DONE | Applied 2026-01-13; audit tracker updated | Guild - Signals | Remediate hotlist findings for `src/Signals/StellaOps.Signals/StellaOps.Signals.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 10 | AUDIT-HOTLIST-SCANNER-LANG-DENO-0001 | DONE | Applied 2026-01-13; runtime hardening, determinism fixes, tests updated | Guild - Scanner | Remediate hotlist findings for `src/Scanner/__Libraries/StellaOps.Scanner.Analyzers.Lang.Deno/StellaOps.Scanner.Analyzers.Lang.Deno.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 11 | AUDIT-HOTLIST-VEXLENS-0001 | DONE | Applied 2026-01-13; audit tracker updated | Guild - VexLens | Remediate hotlist findings for `src/VexLens/StellaOps.VexLens/StellaOps.VexLens.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 12 | AUDIT-HOTLIST-CONCELIER-CORE-0001 | DONE | Applied 2026-01-13; audit tracker updated | Guild - Concelier | Remediate hotlist findings for `src/Concelier/__Libraries/StellaOps.Concelier.Core/StellaOps.Concelier.Core.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 13 | AUDIT-HOTLIST-SCANNER-REACHABILITY-0001 | DONE | Applied 2026-01-13; tracker updated | Guild - Scanner | Remediate hotlist findings for `src/Scanner/__Libraries/StellaOps.Scanner.Reachability/StellaOps.Scanner.Reachability.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 14 | AUDIT-HOTLIST-EVIDENCE-0001 | DONE | Applied 2026-01-13 | Guild - Core | Remediate hotlist findings for `src/__Libraries/StellaOps.Evidence/StellaOps.Evidence.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 15 | AUDIT-HOTLIST-ZASTAVA-OBSERVER-0001 | DONE | Applied 2026-01-13; tests updated | Guild - Zastava | Remediate hotlist findings for `src/Zastava/StellaOps.Zastava.Observer/StellaOps.Zastava.Observer.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 16 | AUDIT-HOTLIST-TESTKIT-0001 | DONE | Applied 2026-01-13; tests updated | Guild - Core | Remediate hotlist findings for `src/__Libraries/StellaOps.TestKit/StellaOps.TestKit.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 17 | AUDIT-HOTLIST-EXCITITOR-WORKER-0001 | DONE | Applied 2026-01-13; determinism, DI, tests | Guild - Excititor | Remediate hotlist findings for `src/Excititor/StellaOps.Excititor.Worker/StellaOps.Excititor.Worker.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 18 | AUDIT-HOTLIST-SCANNER-WORKER-0001 | DONE | Applied 2026-01-13; determinism, cancellation, DSSE | Guild - Scanner | Remediate hotlist findings for `src/Scanner/StellaOps.Scanner.Worker/StellaOps.Scanner.Worker.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 19 | AUDIT-HOTLIST-ROUTER-MICROSERVICE-0001 | DONE | Applied 2026-01-13; tracker updated | Guild - Router | Remediate hotlist findings for `src/Router/__Libraries/StellaOps.Microservice/StellaOps.Microservice.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 20 | AUDIT-HOTLIST-CONCELIER-WEBSERVICE-0001 | DONE | Applied 2026-01-13; TimeProvider defaults, ASCII cleanup, federation tests | Guild - Concelier | Remediate hotlist findings for `src/Concelier/StellaOps.Concelier.WebService/StellaOps.Concelier.WebService.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 21 | AUDIT-HOTLIST-PROVCACHE-0001 | DONE | Applied 2026-01-13; audit tracker updated | Guild - Core | Remediate hotlist findings for `src/__Libraries/StellaOps.Provcache/StellaOps.Provcache.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 22 | AUDIT-HOTLIST-EXCITITOR-CORE-0001 | BLOCKED | Blocked 2026-01-13; Excititor.Core files modified by another agent | Guild - Excititor | Remediate hotlist findings for `src/Excititor/__Libraries/StellaOps.Excititor.Core/StellaOps.Excititor.Core.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 23 | AUDIT-HOTLIST-SBOMSERVICE-0001 | BLOCKED | Blocked 2026-01-13; SbomService files modified by another agent | Guild - SbomService | Remediate hotlist findings for `src/SbomService/StellaOps.SbomService/StellaOps.SbomService.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 24 | AUDIT-HOTLIST-SCANNER-SBOMER-BUILDX-0001 | DONE | Applied 2026-01-13; Hotlist Q2/S1/M2 | Guild - Scanner | Remediate hotlist findings for `src/Scanner/StellaOps.Scanner.Sbomer.BuildXPlugin/StellaOps.Scanner.Sbomer.BuildXPlugin.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 25 | AUDIT-HOTLIST-ATTESTOR-WEBSERVICE-0001 | DONE | Applied 2026-01-13; feature gating + determinism + tests | Guild - Attestor | Remediate hotlist findings for `src/Attestor/StellaOps.Attestor/StellaOps.Attestor.WebService/StellaOps.Attestor.WebService.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 26 | AUDIT-HOTLIST-POLICY-TOOLS-0001 | DONE | Applied 2026-01-14; determinism + parsing guards + tests | Guild - Policy | Remediate hotlist findings for `src/__Libraries/StellaOps.Policy.Tools/StellaOps.Policy.Tools.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 27 | AUDIT-HOTLIST-SCANNER-SOURCES-0001 | DOING | Started 2026-01-14; Hotlist Q2/S0/M1 | Guild - Scanner | Remediate hotlist findings for `src/Scanner/__Libraries/StellaOps.Scanner.Sources/StellaOps.Scanner.Sources.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 28 | AUDIT-HOTLIST-BINARYINDEX-GOLDENSET-0001 | DONE | Applied 2026-01-13; tracker updated | Guild - BinaryIndex | Remediate hotlist findings for `src/BinaryIndex/__Libraries/StellaOps.BinaryIndex.GoldenSet/StellaOps.BinaryIndex.GoldenSet.csproj`; apply fixes, add tests, update audit tracker. |
|
||||
| 29 | AUDIT-TESTGAP-DEVOPS-0001 | DONE | Applied 2026-01-13; tests added | Guild - DevOps | Add tests and references for:<br>`devops/services/crypto/sim-crypto-service/SimCryptoService.csproj`<br>`devops/services/crypto/sim-crypto-smoke/SimCryptoSmoke.csproj`<br>`devops/services/cryptopro/linux-csp-service/CryptoProLinuxApi.csproj`<br>`devops/tools/nuget-prime/nuget-prime.csproj`<br>`devops/tools/nuget-prime/nuget-prime-v9.csproj`. |
|
||||
| 30 | AUDIT-TESTGAP-DOCS-0001 | DONE | Applied 2026-01-13; template tests added, template package waived | Guild - Docs | Add test scaffolding or formal waivers for:<br>`docs/dev/sdks/plugin-templates/StellaOps.Templates.csproj`<br>`docs/dev/sdks/plugin-templates/stellaops-plugin-connector/StellaOps.Plugin.MyConnector.csproj`<br>`docs/dev/sdks/plugin-templates/stellaops-plugin-scheduler/StellaOps.Plugin.MyJob.csproj`. |
|
||||
| 31 | AUDIT-TESTGAP-CRYPTO-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Cryptography | Add tests for:<br>`src/__Libraries/StellaOps.Cryptography.Plugin.Pkcs11Gost/StellaOps.Cryptography.Plugin.Pkcs11Gost.csproj`<br>`src/__Libraries/StellaOps.Cryptography.Plugin.WineCsp/StellaOps.Cryptography.Plugin.WineCsp.csproj`<br>`src/__Libraries/StellaOps.Cryptography.Providers.OfflineVerification/StellaOps.Cryptography.Providers.OfflineVerification.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Eidas/StellaOps.Cryptography.Plugin.Eidas.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Fips/StellaOps.Cryptography.Plugin.Fips.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Gost/StellaOps.Cryptography.Plugin.Gost.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Hsm/StellaOps.Cryptography.Plugin.Hsm.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Sm/StellaOps.Cryptography.Plugin.Sm.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin/StellaOps.Cryptography.Plugin.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Profiles.Ecdsa/StellaOps.Cryptography.Profiles.Ecdsa.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Profiles.EdDsa/StellaOps.Cryptography.Profiles.EdDsa.csproj`<br>`src/Cryptography/StellaOps.Cryptography/StellaOps.Cryptography.csproj`. |
|
||||
| 32 | AUDIT-TESTGAP-CORELIB-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Core | Add tests for:<br>`src/__Libraries/StellaOps.Infrastructure.EfCore/StellaOps.Infrastructure.EfCore.csproj`<br>`src/__Libraries/StellaOps.Interop/StellaOps.Interop.csproj`<br>`src/__Libraries/StellaOps.Orchestrator.Schemas/StellaOps.Orchestrator.Schemas.csproj`<br>`src/__Libraries/StellaOps.Policy.Tools/StellaOps.Policy.Tools.csproj`<br>`src/__Libraries/StellaOps.PolicyAuthoritySignals.Contracts/StellaOps.PolicyAuthoritySignals.Contracts.csproj`<br>`src/__Libraries/StellaOps.Provcache.Postgres/StellaOps.Provcache.Postgres.csproj`<br>`src/__Libraries/StellaOps.Provcache.Valkey/StellaOps.Provcache.Valkey.csproj`<br>`src/__Libraries/StellaOps.ReachGraph.Cache/StellaOps.ReachGraph.Cache.csproj`<br>`src/__Libraries/StellaOps.ReachGraph.Persistence/StellaOps.ReachGraph.Persistence.csproj`<br>`src/__Libraries/StellaOps.Signals.Contracts/StellaOps.Signals.Contracts.csproj`. |
|
||||
| 33 | AUDIT-TESTGAP-ADVISORYAI-0001 | DONE | Applied 2026-01-14; tests + deterministic jitter source | Guild - AdvisoryAI | Add tests for:<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Plugin.Unified/StellaOps.AdvisoryAI.Plugin.Unified.csproj`<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Scm.Plugin.Unified/StellaOps.AdvisoryAI.Scm.Plugin.Unified.csproj`<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Worker/StellaOps.AdvisoryAI.Worker.csproj`. |
|
||||
| 34 | AUDIT-TESTGAP-AUTH-CONCELIER-ATTESTOR-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Module Leads | Add tests for:<br>`src/Attestor/StellaOps.Attestor.Types/Tools/StellaOps.Attestor.Types.Generator/StellaOps.Attestor.Types.Generator.csproj`<br>`src/Authority/StellaOps.Authority/StellaOps.Authority.Plugin.Unified/StellaOps.Authority.Plugin.Unified.csproj`<br>`src/Concelier/__Libraries/StellaOps.Concelier.ProofService/StellaOps.Concelier.ProofService.csproj`<br>`src/Concelier/StellaOps.Concelier.Plugin.Unified/StellaOps.Concelier.Plugin.Unified.csproj`. |
|
||||
| 35 | AUDIT-TESTGAP-SERVICES-CORE-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Platform Services | Add tests for:<br>`src/EvidenceLocker/StellaOps.EvidenceLocker/StellaOps.EvidenceLocker.csproj`<br>`src/EvidenceLocker/StellaOps.EvidenceLocker/StellaOps.EvidenceLocker.Worker/StellaOps.EvidenceLocker.Worker.csproj`<br>`src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.Worker/StellaOps.ExportCenter.Worker.csproj`<br>`src/Feedser/StellaOps.Feedser.BinaryAnalysis/StellaOps.Feedser.BinaryAnalysis.csproj`<br>`src/IssuerDirectory/StellaOps.IssuerDirectory/StellaOps.IssuerDirectory.Infrastructure/StellaOps.IssuerDirectory.Infrastructure.csproj`<br>`src/IssuerDirectory/StellaOps.IssuerDirectory/StellaOps.IssuerDirectory.WebService/StellaOps.IssuerDirectory.WebService.csproj`<br>`src/Notify/__Libraries/StellaOps.Notify.Storage.InMemory/StellaOps.Notify.Storage.InMemory.csproj`<br>`src/OpsMemory/StellaOps.OpsMemory.WebService/StellaOps.OpsMemory.WebService.csproj`<br>`src/Orchestrator/StellaOps.Orchestrator/StellaOps.Orchestrator.Worker/StellaOps.Orchestrator.Worker.csproj`<br>`src/PacksRegistry/StellaOps.PacksRegistry/StellaOps.PacksRegistry.Persistence.EfCore/StellaOps.PacksRegistry.Persistence.EfCore.csproj`<br>`src/PacksRegistry/StellaOps.PacksRegistry/StellaOps.PacksRegistry.Worker/StellaOps.PacksRegistry.Worker.csproj`. |
|
||||
| 36 | AUDIT-TESTGAP-SERVICES-PLATFORM-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Platform Services | Add tests for:<br>`src/Policy/__Libraries/StellaOps.Policy.AuthSignals/StellaOps.Policy.AuthSignals.csproj`<br>`src/Policy/__Libraries/StellaOps.Policy.Explainability/StellaOps.Policy.Explainability.csproj`<br>`src/Policy/StellaOps.Policy.Registry/StellaOps.Policy.Registry.csproj`<br>`src/RiskEngine/StellaOps.RiskEngine/StellaOps.RiskEngine.Worker/StellaOps.RiskEngine.Worker.csproj`<br>`src/Scheduler/StellaOps.Scheduler.Worker.Host/StellaOps.Scheduler.Worker.Host.csproj`<br>`src/Signals/StellaOps.Signals.Scheduler/StellaOps.Signals.Scheduler.csproj`<br>`src/TaskRunner/StellaOps.TaskRunner/StellaOps.TaskRunner.Worker/StellaOps.TaskRunner.Worker.csproj`<br>`src/TimelineIndexer/StellaOps.TimelineIndexer/StellaOps.TimelineIndexer.WebService/StellaOps.TimelineIndexer.WebService.csproj`<br>`src/Unknowns/__Libraries/StellaOps.Unknowns.Persistence.EfCore/StellaOps.Unknowns.Persistence.EfCore.csproj`<br>`src/VexHub/__Libraries/StellaOps.VexHub.Persistence/StellaOps.VexHub.Persistence.csproj`<br>`src/VexLens/StellaOps.VexLens.Persistence/StellaOps.VexLens.Persistence.csproj`<br>`src/VexLens/StellaOps.VexLens.WebService/StellaOps.VexLens.WebService.csproj`. |
|
||||
| 37 | AUDIT-TESTGAP-INTEGRATIONS-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Integrations | Add tests for:<br>`src/Integrations/__Libraries/StellaOps.Integrations.Persistence/StellaOps.Integrations.Persistence.csproj`<br>`src/Integrations/__Plugins/StellaOps.Integrations.Plugin.Harbor/StellaOps.Integrations.Plugin.Harbor.csproj`<br>`src/Integrations/__Plugins/StellaOps.Integrations.Plugin.InMemory/StellaOps.Integrations.Plugin.InMemory.csproj`<br>`src/Plugin/StellaOps.Plugin.Sdk/StellaOps.Plugin.Sdk.csproj`. |
|
||||
| 38 | AUDIT-TESTGAP-SCANNER-SBOM-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Scanner | Add tests for:<br>`src/SbomService/__Libraries/StellaOps.SbomService.Lineage/StellaOps.SbomService.Lineage.csproj`<br>`src/Scanner/__Libraries/StellaOps.Scanner.Analyzers.Native/StellaOps.Scanner.Analyzers.Native.csproj`<br>`src/Scanner/__Libraries/StellaOps.Scanner.ProofIntegration/StellaOps.Scanner.ProofIntegration.csproj`<br>`src/Scanner/StellaOps.Scanner.Analyzers.Plugin.Unified/StellaOps.Scanner.Analyzers.Plugin.Unified.csproj`. |
|
||||
| 39 | AUDIT-TESTGAP-ROUTER-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Router | Add tests for:<br>`src/Router/__Libraries/StellaOps.Router.AspNet/StellaOps.Router.AspNet.csproj`<br>`src/Router/StellaOps.Router.Plugin.Unified/StellaOps.Router.Plugin.Unified.csproj`<br>`src/Router/examples/Examples.Billing.Microservice/Examples.Billing.Microservice.csproj`<br>`src/Router/examples/Examples.Gateway/Examples.Gateway.csproj`<br>`src/Router/examples/Examples.Inventory.Microservice/Examples.Inventory.Microservice.csproj`<br>`src/Router/examples/Examples.MultiTransport.Gateway/Examples.MultiTransport.Gateway.csproj`<br>`src/Router/examples/Examples.NotificationService/Examples.NotificationService.csproj`<br>`src/Router/examples/Examples.OrderService/Examples.OrderService.csproj`. |
|
||||
| 40 | AUDIT-TESTGAP-SYMBOLS-0001 | TODO | Approved 2026-01-12; Production Test Gap Inventory | Guild - Symbols | Add tests for:<br>`src/Symbols/StellaOps.Symbols.Bundle/StellaOps.Symbols.Bundle.csproj`<br>`src/Symbols/StellaOps.Symbols.Client/StellaOps.Symbols.Client.csproj`<br>`src/Symbols/StellaOps.Symbols.Core/StellaOps.Symbols.Core.csproj`<br>`src/Symbols/StellaOps.Symbols.Infrastructure/StellaOps.Symbols.Infrastructure.csproj`<br>`src/Symbols/StellaOps.Symbols.Server/StellaOps.Symbols.Server.csproj`. |
|
||||
| 41 | AUDIT-REUSE-DEVOPS-DOCS-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - DevOps/Docs | Resolve reuse gaps for:<br>`devops/services/crypto/sim-crypto-service/SimCryptoService.csproj`<br>`devops/services/cryptopro/linux-csp-service/CryptoProLinuxApi.csproj`<br>`devops/tools/nuget-prime/nuget-prime.csproj`<br>`devops/tools/nuget-prime/nuget-prime-v9.csproj`<br>`docs/dev/sdks/plugin-templates/StellaOps.Templates.csproj`<br>`docs/dev/sdks/plugin-templates/stellaops-plugin-connector/StellaOps.Plugin.MyConnector.csproj`<br>`docs/dev/sdks/plugin-templates/stellaops-plugin-scheduler/StellaOps.Plugin.MyJob.csproj`. |
|
||||
| 42 | AUDIT-REUSE-CORELIBS-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Core | Resolve reuse gaps for:<br>`src/__Libraries/StellaOps.Cryptography.Providers.OfflineVerification/StellaOps.Cryptography.Providers.OfflineVerification.csproj`<br>`src/__Libraries/StellaOps.Interop/StellaOps.Interop.csproj`<br>`src/__Libraries/StellaOps.Orchestrator.Schemas/StellaOps.Orchestrator.Schemas.csproj`<br>`src/__Libraries/StellaOps.PolicyAuthoritySignals.Contracts/StellaOps.PolicyAuthoritySignals.Contracts.csproj`<br>`src/__Libraries/StellaOps.Provcache.Postgres/StellaOps.Provcache.Postgres.csproj`<br>`src/__Libraries/StellaOps.Provcache.Valkey/StellaOps.Provcache.Valkey.csproj`<br>`src/__Libraries/StellaOps.Signals.Contracts/StellaOps.Signals.Contracts.csproj`. |
|
||||
| 43 | AUDIT-REUSE-ADVISORY-AUTH-CONCELIER-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Module Leads | Resolve reuse gaps for:<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Plugin.Unified/StellaOps.AdvisoryAI.Plugin.Unified.csproj`<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Scm.Plugin.Unified/StellaOps.AdvisoryAI.Scm.Plugin.Unified.csproj`<br>`src/AdvisoryAI/StellaOps.AdvisoryAI.Worker/StellaOps.AdvisoryAI.Worker.csproj`<br>`src/Authority/StellaOps.Authority/StellaOps.Authority.Plugin.Unified/StellaOps.Authority.Plugin.Unified.csproj`<br>`src/Concelier/StellaOps.Concelier.Plugin.Unified/StellaOps.Concelier.Plugin.Unified.csproj`. |
|
||||
| 44 | AUDIT-REUSE-CRYPTO-PROFILES-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Cryptography | Resolve reuse gaps for:<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Eidas/StellaOps.Cryptography.Plugin.Eidas.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Fips/StellaOps.Cryptography.Plugin.Fips.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Gost/StellaOps.Cryptography.Plugin.Gost.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Hsm/StellaOps.Cryptography.Plugin.Hsm.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Plugin.Sm/StellaOps.Cryptography.Plugin.Sm.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Profiles.Ecdsa/StellaOps.Cryptography.Profiles.Ecdsa.csproj`<br>`src/Cryptography/StellaOps.Cryptography.Profiles.EdDsa/StellaOps.Cryptography.Profiles.EdDsa.csproj`. |
|
||||
| 45 | AUDIT-REUSE-INTEGRATIONS-ROUTER-SCANNER-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Integrations/Router/Scanner | Resolve reuse gaps for:<br>`src/Integrations/__Plugins/StellaOps.Integrations.Plugin.Harbor/StellaOps.Integrations.Plugin.Harbor.csproj`<br>`src/Integrations/__Plugins/StellaOps.Integrations.Plugin.InMemory/StellaOps.Integrations.Plugin.InMemory.csproj`<br>`src/Router/examples/Examples.Gateway/Examples.Gateway.csproj`<br>`src/Router/examples/Examples.MultiTransport.Gateway/Examples.MultiTransport.Gateway.csproj`<br>`src/Router/StellaOps.Router.Plugin.Unified/StellaOps.Router.Plugin.Unified.csproj`<br>`src/Scanner/__Libraries/StellaOps.Scanner.ProofIntegration/StellaOps.Scanner.ProofIntegration.csproj`<br>`src/Scanner/StellaOps.Scanner.Analyzers.Plugin.Unified/StellaOps.Scanner.Analyzers.Plugin.Unified.csproj`. |
|
||||
| 46 | AUDIT-REUSE-SERVICES-CORE-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Platform Services | Resolve reuse gaps for:<br>`src/EvidenceLocker/StellaOps.EvidenceLocker/StellaOps.EvidenceLocker.Worker/StellaOps.EvidenceLocker.Worker.csproj`<br>`src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.Worker/StellaOps.ExportCenter.Worker.csproj`<br>`src/IssuerDirectory/StellaOps.IssuerDirectory/StellaOps.IssuerDirectory.WebService/StellaOps.IssuerDirectory.WebService.csproj`<br>`src/Notify/__Libraries/StellaOps.Notify.Storage.InMemory/StellaOps.Notify.Storage.InMemory.csproj`<br>`src/OpsMemory/StellaOps.OpsMemory.WebService/StellaOps.OpsMemory.WebService.csproj`<br>`src/Orchestrator/StellaOps.Orchestrator/StellaOps.Orchestrator.Worker/StellaOps.Orchestrator.Worker.csproj`<br>`src/PacksRegistry/StellaOps.PacksRegistry/StellaOps.PacksRegistry.Persistence.EfCore/StellaOps.PacksRegistry.Persistence.EfCore.csproj`<br>`src/PacksRegistry/StellaOps.PacksRegistry/StellaOps.PacksRegistry.Worker/StellaOps.PacksRegistry.Worker.csproj`. |
|
||||
| 47 | AUDIT-REUSE-SERVICES-PLATFORM-0001 | TODO | Approved 2026-01-12; Production Reuse Gap Inventory | Guild - Platform Services | Resolve reuse gaps for:<br>`src/Policy/__Libraries/StellaOps.Policy.AuthSignals/StellaOps.Policy.AuthSignals.csproj`<br>`src/Policy/StellaOps.Policy.Registry/StellaOps.Policy.Registry.csproj`<br>`src/RiskEngine/StellaOps.RiskEngine/StellaOps.RiskEngine.Worker/StellaOps.RiskEngine.Worker.csproj`<br>`src/Signals/StellaOps.Signals.Scheduler/StellaOps.Signals.Scheduler.csproj`<br>`src/Symbols/StellaOps.Symbols.Bundle/StellaOps.Symbols.Bundle.csproj`<br>`src/Symbols/StellaOps.Symbols.Server/StellaOps.Symbols.Server.csproj`<br>`src/TaskRunner/StellaOps.TaskRunner/StellaOps.TaskRunner.Worker/StellaOps.TaskRunner.Worker.csproj`<br>`src/TimelineIndexer/StellaOps.TimelineIndexer/StellaOps.TimelineIndexer.WebService/StellaOps.TimelineIndexer.WebService.csproj`<br>`src/VexLens/StellaOps.VexLens.WebService/StellaOps.VexLens.WebService.csproj`. |
|
||||
| 48 | AUDIT-LONGTAIL-CORE-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Core | Batch remaining TODO APPLY items for shared libraries, analyzers, and test harnesses under `src/__Libraries`, `src/__Analyzers`, and `src/__Tests`; update audit tracker and evidence. |
|
||||
| 49 | AUDIT-LONGTAIL-SCANNER-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Scanner | Batch remaining TODO APPLY items for Scanner projects (libraries, webservice, worker, analyzers, plugins); update audit tracker and evidence. |
|
||||
| 50 | AUDIT-LONGTAIL-CONCELIER-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Concelier | Batch remaining TODO APPLY items for Concelier core, connectors, exporters, and web service; update audit tracker and evidence. |
|
||||
| 51 | AUDIT-LONGTAIL-POLICY-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Policy | Batch remaining TODO APPLY items for Policy Engine and related libraries/tests; update audit tracker and evidence. |
|
||||
| 52 | AUDIT-LONGTAIL-AUTH-ATTESTOR-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Authority/Attestor | Batch remaining TODO APPLY items for Authority, Attestor, Signer, and Registry projects; update audit tracker and evidence. |
|
||||
| 53 | AUDIT-LONGTAIL-ROUTER-GRAPH-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Router/Graph | Batch remaining TODO APPLY items for Router, Gateway, Messaging, and Graph projects; update audit tracker and evidence. |
|
||||
| 54 | AUDIT-LONGTAIL-NOTIFY-EXPORT-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Notify/ExportCenter | Batch remaining TODO APPLY items for Notify, ExportCenter, EvidenceLocker, Findings, and related services; update audit tracker and evidence. |
|
||||
| 55 | AUDIT-LONGTAIL-ORCH-PLATFORM-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - Platform | Batch remaining TODO APPLY items for Orchestrator, PacksRegistry, Platform, Scheduler, Signals, TaskRunner, Timeline, and OpsMemory; update audit tracker and evidence. |
|
||||
| 56 | AUDIT-LONGTAIL-DEVOPS-DOCS-0001 | TODO | Approved 2026-01-12; Apply Status Summary (TODO 851) | Guild - DevOps/Docs | Batch remaining TODO APPLY items for devops tools/services and docs templates; update audit tracker and evidence. |
|
||||
| 57 | AUDIT-PENDING-TRACKER-0001 | TODO | After each remediation batch | Guild - PMO | Keep archived audit files and apply status summary in sync; record decisions/risks for each batch. |
|
||||
| 58 | AUDIT-SLN-NEWPROJECTS-0001 | DONE | Completed 2026-01-12; src/StellaOps.sln and audit tracker updated | Guild - PMO | Add missing projects to `src/StellaOps.sln`, audit new projects (quality/security/tests/maintainability), and update archived audit tracker findings. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-12 | Started AUDIT-HOTLIST-SCANNER-CONTRACTS-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-12 | Completed AUDIT-HOTLIST-SCANNER-CONTRACTS-0001; updated safe JSON encoding and coverage, updated audit tracker and local TASKS.md. | Project Mgmt |
|
||||
| 2026-01-12 | Started AUDIT-HOTLIST-SCANNER-LANG-DOTNET-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-12 | Blocked AUDIT-HOTLIST-CLI-0001: CLI tests are being modified by another agent; cannot update tests without touching their work. | Project Mgmt |
|
||||
| 2026-01-12 | Started AUDIT-HOTLIST-EXPORTCENTER-WEBSERVICE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-EXPORTCENTER-WEBSERVICE-0001; determinism/DI guards, retention/TLS gating, tests; updated audit tracker and TASKS.md. | Project Mgmt |
|
||||
| 2026-01-12 | Completed AUDIT-HOTLIST-SCANNER-LANG-DOTNET-0001; applied fixes and tests, updated audit tracker and local TASKS.md. | Project Mgmt |
|
||||
| 2026-01-12 | Test run failed for StellaOps.Scanner.Analyzers.Lang.DotNet.Tests: missing testhost.dll in testhost.deps.json. | Project Mgmt |
|
||||
| 2026-01-12 | Started AUDIT-SLN-NEWPROJECTS-0001 to add missing projects and audit new entries. | Project Mgmt |
|
||||
| 2026-01-12 | Completed AUDIT-SLN-NEWPROJECTS-0001: src/StellaOps.sln synced to include all csproj; Doctor projects audited and recorded in archived tracker findings. | Project Mgmt |
|
||||
| 2026-01-12 | Added Doctor.Tests to src/StellaOps.sln and extended archived audit tracker with audit rows and findings for the new test project. | Project Mgmt |
|
||||
| 2026-01-12 | Added Doctor.WebService to src/StellaOps.sln and extended archived audit tracker with audit rows and findings for the new service project. | Project Mgmt |
|
||||
| 2026-01-12 | Archived SPRINT_20260112_002_BE_csproj_audit_apply_backlog.md to docs-archived/implplan/2026-01-12-csproj-audit-apply-backlog/. | Project Mgmt |
|
||||
| 2026-01-12 | Expanded Delivery Tracker with per-project hotlist items and batched test/reuse gap remediation tasks. | Project Mgmt |
|
||||
| 2026-01-12 | Set working directory to repo root to cover devops and docs items in test/reuse gaps. | Project Mgmt |
|
||||
| 2026-01-12 | Sprint created to execute approved pending APPLY actions from the C# audit backlog. | Project Mgmt |
|
||||
| 2026-01-12 | Tests failed: StellaOps.Scanner.CallGraph.Tests (ValkeyCallGraphCacheServiceTests null result, BinaryDisassemblyTests target mismatch, BenchmarkIntegrationTests repo root missing). | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-POLICY-ENGINE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-POLICY-ENGINE-0001 remediation work; updated determinism, auth, options binding, and tests. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-SCANNER-NATIVE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-NATIVE-0001; updated native analyzer determinism, hardening, runtime capture, and tests; updated audit tracker. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-SCANNER-WEBSERVICE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-WEBSERVICE-0001; DSSE PAE, determinism/auth updates, test fixes; trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-SCANNER-SBOMER-BUILDX-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-SBOMER-BUILDX-0001; canonical surface manifests, HttpClientFactory + TLS guardrails, deterministic tests; trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-SCANNER-LANG-DENO-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-LANG-DENO-0001; runtime hardening, deterministic ordering, safe JSON encoding, tests updated; trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-SCANNER-REACHABILITY-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-REACHABILITY-0001; DSSE PAE/canon, determinism/cancellation fixes, invariant formatting, tests; trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-EVIDENCE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-EVIDENCE-0001 (determinism, schema validation, budgets, retention, tests). | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-EXPORTCENTER-CORE-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-CONCELIER-CORE-0001; determinism fixes and tests applied; audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SIGNALS-0001; revalidated fixes already in code, audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-VEXLENS-0001; determinism defaults and tracker updates applied. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-ZASTAVA-OBSERVER-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-ZASTAVA-OBSERVER-0001; TimeProvider retry-after, explicit timestamps, ASCII truncation, HttpClient injection, tests added, audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-TESTKIT-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-TESTKIT-0001; HttpClientFactory fixtures, TimeProvider request timestamps, ASCII cleanup, deterministic random, Task.Run removal, sync-over-async removal, tests added, audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-HOTLIST-EXCITITOR-WORKER-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-EXCITITOR-WORKER-0001; determinism/DI fixes, plugin diagnostics, deterministic jitter/IDs, tests added; audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-ROUTER-MICROSERVICE-0001; headers, request dispatch, schema direction, options validation, YAML parsing diagnostics, tests, and audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-CONCELIER-WEBSERVICE-0001; TimeProvider defaults, ASCII cleanup, federation endpoint tests, audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-BINARYINDEX-GOLDENSET-0001; newline determinism, TODO cleanup, and review workflow tests updated. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-SCANNER-WORKER-0001; determinism/cancellation, DSSE canon, test fixes; updated audit trackers and TASKS.md. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-PROVCACHE-0001; lazy fetch allowlist/timeout enforcement, canonical JSON signing, signature verification, options validation, and tests; audit trackers updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-TESTGAP-DEVOPS-0001 (devops service/tool test scaffolding). | Implementer |
|
||||
| 2026-01-13 | Completed AUDIT-TESTGAP-DEVOPS-0001; added devops tests, AGENTS, and package versions. Tests: `dotnet test devops/services/crypto/sim-crypto-service/__Tests/SimCryptoService.Tests/SimCryptoService.Tests.csproj`, `dotnet test devops/services/crypto/sim-crypto-smoke/__Tests/SimCryptoSmoke.Tests/SimCryptoSmoke.Tests.csproj`, `dotnet test devops/services/cryptopro/linux-csp-service/__Tests/CryptoProLinuxApi.Tests/CryptoProLinuxApi.Tests.csproj`, `dotnet test devops/tools/nuget-prime/__Tests/NugetPrime.Tests/NugetPrime.Tests.csproj`. | Implementer |
|
||||
| 2026-01-13 | Started AUDIT-TESTGAP-DOCS-0001 (plugin template test scaffolding). | Implementer |
|
||||
| 2026-01-13 | Completed AUDIT-TESTGAP-DOCS-0001; added plugin template tests, waived template package, updated audit tracker. Tests: `dotnet test docs/dev/sdks/plugin-templates/stellaops-plugin-connector/__Tests/StellaOps.Plugin.MyConnector.Tests/StellaOps.Plugin.MyConnector.Tests.csproj`, `dotnet test docs/dev/sdks/plugin-templates/stellaops-plugin-scheduler/__Tests/StellaOps.Plugin.MyJob.Tests/StellaOps.Plugin.MyJob.Tests.csproj` (failed: template project references not present in repo). | Implementer |
|
||||
| 2026-01-13 | Re-ran template tests after updating ProjectReference paths, package versions, and connector interface usage. Tests: `dotnet test docs/dev/sdks/plugin-templates/stellaops-plugin-connector/__Tests/StellaOps.Plugin.MyConnector.Tests/StellaOps.Plugin.MyConnector.Tests.csproj`, `dotnet test docs/dev/sdks/plugin-templates/stellaops-plugin-scheduler/__Tests/StellaOps.Plugin.MyJob.Tests/StellaOps.Plugin.MyJob.Tests.csproj`. | Implementer |
|
||||
| 2026-01-13 | Blocked AUDIT-HOTLIST-EXCITITOR-CORE-0001; Excititor.Core files already modified by another agent. | Project Mgmt |
|
||||
| 2026-01-13 | Blocked AUDIT-HOTLIST-SBOMSERVICE-0001; SbomService files already modified by another agent. | Project Mgmt |
|
||||
| 2026-01-13 | Completed AUDIT-HOTLIST-ATTESTOR-WEBSERVICE-0001; feature gating filter, correlation ID provider, proof chain/verification summary fixes, tests updated. | Project Mgmt |
|
||||
| 2026-01-13 | Started AUDIT-TESTGAP-ADVISORYAI-0001 (plugin/unified + worker tests, deterministic jitter source). | AdvisoryAI |
|
||||
| 2026-01-14 | Completed AUDIT-TESTGAP-ADVISORYAI-0001; added adapter tests, worker cache tests, jitter source injection, and updated audit trackers. | AdvisoryAI |
|
||||
| 2026-01-14 | Tests: `dotnet test src/AdvisoryAI/__Tests/StellaOps.AdvisoryAI.Tests/StellaOps.AdvisoryAI.Tests.csproj`. | AdvisoryAI |
|
||||
| 2026-01-14 | Started AUDIT-HOTLIST-POLICY-TOOLS-0001 remediation work. | Project Mgmt |
|
||||
| 2026-01-14 | Completed AUDIT-HOTLIST-POLICY-TOOLS-0001; LF schema output, fixed-time default, parsing guards, deterministic summary output, cancellation propagation, tests added. | Project Mgmt |
|
||||
| 2026-01-14 | Started AUDIT-HOTLIST-SCANNER-SOURCES-0001 remediation work. | Project Mgmt |
|
||||
|
||||
## Decisions & Risks
|
||||
- APPROVED 2026-01-12: All pending APPLY actions are approved for execution under module review gates.
|
||||
- Cross-module remediation touches many modules; mitigate with staged batches and explicit ownership.
|
||||
- Cross-module doc link updates applied for archived audit files and the code-of-conduct relocation in docs/code-of-conduct/.
|
||||
- Backlog size (851 TODO APPLY items); mitigate by prioritizing hotlists then long-tail batches.
|
||||
- Devops and docs items are in scope; cross-directory changes must be logged per sprint guidance.
|
||||
- BLOCKED: AUDIT-HOTLIST-CLI-0001 requires edits in `src/Cli/__Tests/StellaOps.Cli.Tests` which are under active modification by another agent; defer until those changes land or ownership is coordinated.
|
||||
- BLOCKED: AUDIT-HOTLIST-EXCITITOR-CORE-0001 is blocked because `src/Excititor/__Libraries/StellaOps.Excititor.Core` is under active modification by another agent.
|
||||
- BLOCKED: AUDIT-HOTLIST-SBOMSERVICE-0001 is blocked because `src/SbomService/StellaOps.SbomService` is under active modification by another agent.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Security hotlist remediation review.
|
||||
- TBD: Test gap remediation checkpoint.
|
||||
@@ -0,0 +1,44 @@
|
||||
# Sprint 20260112-003-EXPORT - Lineage Evidence Pack Alignment
|
||||
|
||||
## Topic & Scope
|
||||
- Replace placeholder lineage evidence pack logic with deterministic bundle assembly aligned to the evidence bundle export format.
|
||||
- Integrate real data sources (SBOM, VEX, policy verdicts, attestations) and remove silent success paths in the lineage pack service.
|
||||
- Evidence to produce: updated Export Center core services, pack outputs, and determinism tests under `src/ExportCenter/StellaOps.ExportCenter`.
|
||||
- **Working directory:** `src/ExportCenter/StellaOps.ExportCenter`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on SPRINT_20260112_001_DOCS for schema definitions.
|
||||
- Aligns with SPRINT_20260112_002_EVIDENCE metadata fields for transparency and timestamps.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/export-center/architecture.md`
|
||||
- `docs/modules/export-center/overview.md`
|
||||
- `docs/modules/export-center/provenance-and-signing.md`
|
||||
- `docs/modules/evidence-locker/export-format.md`
|
||||
- `docs/modules/evidence-locker/evidence-bundle-v1.md`
|
||||
- `src/ExportCenter/AGENTS.md`
|
||||
- `src/ExportCenter/StellaOps.ExportCenter/AGENTS.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EXP-CEPACK-001 | TODO | After DOCS-CEPACK-001 schema fields are final | Export Center Guild | Replace placeholder logic in `src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.Core/Services/LineageEvidencePackService.cs` with real data retrieval (SBOM, VEX, policy verdicts, attestations) or explicit NotImplemented errors where integrations are missing. |
|
||||
| 2 | EXP-CEPACK-002 | TODO | After EXP-CEPACK-001 | Export Center Guild | Generate deterministic pack outputs (tar.gz or existing OfflineBundlePackager) with manifest and checksums aligned to the new evidence pack schema; integrate DSSE signing and transparency references when available. |
|
||||
| 3 | EXP-CEPACK-003 | TODO | After EXP-CEPACK-002 | Export Center Guild / QA | Add determinism tests for pack assembly, manifest ordering, and verification in `src/ExportCenter/StellaOps.ExportCenter/StellaOps.ExportCenter.Tests`. |
|
||||
| 4 | EXP-CEPACK-004 | TODO | After EXP-CEPACK-002 | Export Center Guild | Update Export Center API outputs and metrics for lineage pack downloads; ensure tenant scoping and audit logs are preserved. |
|
||||
| 5 | EXP-CEPACK-005 | TODO | After EXP-CEPACK-004 | Export Center Guild | Update `src/ExportCenter/AGENTS.md` and `src/ExportCenter/StellaOps.ExportCenter/AGENTS.md` to call out evidence pack alignment requirements and determinism checks. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; focuses on lineage evidence pack implementation and determinism. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Pack format choice (tar.gz vs OfflineBundlePackager output) must match evidence bundle export format and remain offline-friendly.
|
||||
- Missing upstream integrations (SBOM/VEX/policy APIs) may require explicit NotImplemented handling to avoid silent stubs.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-22: Lineage pack implementation review and determinism test plan.
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112.004.ATTESTOR · VEX Override Attestation Predicate
|
||||
|
||||
## Topic & Scope
|
||||
- Define and implement a DSSE/in-toto predicate for VEX override attestations (operator decisions such as not_affected or compensating controls).
|
||||
- Support optional Rekor anchoring and offline verification paths without changing existing attestation workflows.
|
||||
- Working directory: `src/Attestor`. Evidence: predicate schema, builder, verification tests, and sample payloads.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Downstream: `SPRINT_20260112_004_VULN_vex_override_workflow.md` consumes the predicate to mint attestations.
|
||||
- Parallel-safe with Scanner and Findings sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
- `docs/modules/attestor/rekor-verification-design.md`
|
||||
- `docs/VEX_CONSENSUS_GUIDE.md`
|
||||
- `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md`
|
||||
- `src/__Libraries/StellaOps.Canonical.Json/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | ATT-VEX-001 | TODO | Predicate spec | Attestor Guild | Add VEX override predicate schema and typed model (decision, evidence refs, tool versions, rule digests, artifact digest, trace hash). |
|
||||
| 2 | ATT-VEX-002 | TODO | Builder + verify | Attestor Guild | Implement predicate builder and DSSE envelope creation/verification; canonicalize predicate payloads with `StellaOps.Canonical.Json` before hashing; add unit and integration tests. |
|
||||
| 3 | ATT-VEX-003 | TODO | Cross-module docs | Attestor Guild | Document predicate and include a sample payload in `docs/modules/attestor/` and referenced schemas. |
|
||||
| 4 | ATT-VEX-004 | TODO | Canonicalization contract | Attestor Guild | Document canonicalization rules and required serializer options (no CamelCase, default encoder) for the VEX override predicate. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Predicate must use RFC 8785 canonicalization via `StellaOps.Canonical.Json` with explicit serializer options (no CamelCase, default encoder) and DSSE PAE helper; no custom encoding.
|
||||
- Rekor anchoring is optional; offline verification must still succeed with embedded proofs.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm predicate field set with Policy and VEX Lens consumers.
|
||||
@@ -0,0 +1,45 @@
|
||||
# Sprint 20260112_004_BE - Findings Scoring Attested Reduction
|
||||
|
||||
## Topic & Scope
|
||||
- Wire anchor-aware evidence into Findings Ledger scoring so attested reduction and hard-fail outcomes are surfaced in the API response and history.
|
||||
- Extend scoring DTOs to expose reduction profile metadata, hard-fail status, and short-circuit reasons in a deterministic format.
|
||||
- Ensure cache and history behaviors remain deterministic when reduction profile or anchors change.
|
||||
- **Working directory:** `src/Findings/StellaOps.Findings.Ledger.WebService`; evidence: updated scoring DTOs, evidence provider wiring, endpoint tests. Allowed shared paths: `docs/api/findings-scoring.md`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Signals sprint for reduction profile fields and anchor schema.
|
||||
- Coordinate with Policy sprint for shared anchor field names used across evidence types.
|
||||
- Parallel execution is safe if API docs are edited after Signals updates land.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/api/findings-scoring.md
|
||||
- docs/VEX_CONSENSUS_GUIDE.md
|
||||
- src/Findings/AGENTS.md
|
||||
- src/Findings/StellaOps.Findings.Ledger/AGENTS.md
|
||||
- src/Findings/StellaOps.Findings.Ledger.WebService/AGENTS.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EWS-API-001 | TODO | Align with Signals reduction output | Findings Guild - Backend | Extend scoring DTOs to include reduction profile metadata, hard-fail flag, and short-circuit reason fields. |
|
||||
| 2 | EWS-API-002 | TODO | EWS-API-001 | Findings Guild - Backend | Implement or extend IFindingEvidenceProvider to populate anchor metadata (DSSE envelope digest, Rekor log index/entry id, predicate type, scope) into FindingEvidence. |
|
||||
| 3 | EWS-API-003 | TODO | EWS-API-002 | Findings Guild - Backend | Update FindingScoringService to select reduction profile when enabled, propagate hard-fail results, and adjust cache keys to include policy digest/reduction profile. |
|
||||
| 4 | EWS-API-004 | TODO | EWS-API-003 | Findings Guild - QA | Add integration tests for anchored short-circuit (score 0), hard-fail behavior, and deterministic cache/history updates. |
|
||||
| 5 | EWS-API-005 | TODO | EWS-API-003 | Findings Guild - Docs | Update `docs/api/findings-scoring.md` with new fields and response examples for reduction mode. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision pending: exact response field names for hard-fail and reduction metadata.
|
||||
- Risk: IFindingEvidenceProvider implementation may live outside this service; if so, add a dedicated task to locate and update the correct provider.
|
||||
- Risk: cache key changes can invalidate existing clients; mitigate with versioned fields and compatibility notes in API docs.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: API schema review with Signals and Policy owners.
|
||||
- TBD: Endpoint contract test run.
|
||||
@@ -0,0 +1,46 @@
|
||||
# Sprint 20260112_004_BE - Policy Determinization Attested Rules
|
||||
|
||||
## Topic & Scope
|
||||
- Add anchor-aware determinization rules that honor attested VEX and patch proof evidence with explicit precedence and hard-fail semantics.
|
||||
- Extend determinization evidence models to carry anchor metadata (DSSE envelope digest, Rekor log index/entry id, predicate type, scope) and propagate through signal snapshots.
|
||||
- Tighten VEX proof gate defaults to require signed statements and anchored proofs when used for allow decisions.
|
||||
- **Working directory:** `src/Policy`; evidence: updated determinization models, rule set changes, gate options, tests. Allowed shared paths: `docs/modules/policy/determinization-api.md`, `docs/VEX_CONSENSUS_GUIDE.md`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Signals sprint for anchor schema and reduction semantics.
|
||||
- Coordinate with Findings sprint on anchor field names surfaced in evidence providers.
|
||||
- Parallel execution is safe if shared docs are sequenced after core model changes.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/policy/architecture.md
|
||||
- docs/modules/policy/determinization-api.md
|
||||
- docs/VEX_CONSENSUS_GUIDE.md
|
||||
- src/Policy/AGENTS.md
|
||||
- src/Policy/StellaOps.Policy.Engine/AGENTS.md
|
||||
- src/Policy/__Libraries/StellaOps.Policy.Determinization/AGENTS.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DET-ATT-001 | TODO | Align anchor schema with Signals | Policy Guild - Backend | Extend determinization evidence models (VexClaimSummary, BackportEvidence, RuntimeEvidence, ReachabilityEvidence if needed) to include anchor metadata fields and update JSON serialization tests. |
|
||||
| 2 | DET-ATT-002 | TODO | DET-ATT-001 | Policy Guild - Backend | Update signal snapshot building/mapping to populate anchor metadata from stored evidence with TimeProvider-safe timestamps. |
|
||||
| 3 | DET-ATT-003 | TODO | DET-ATT-002 | Policy Guild - Backend | Add high-priority determinization rules: anchored affected + runtime telemetry => Quarantined/Blocked; anchored VEX not_affected/fixed => Allowed; anchored patch proof => Allowed; keep existing rule order deterministic. |
|
||||
| 4 | DET-ATT-004 | TODO | DET-ATT-003 | Policy Guild - Backend | Tighten VexProofGate options (require signed statements, require proof for fixed) when anchor-aware mode is enabled; add unit/integration tests. |
|
||||
| 5 | DET-ATT-005 | TODO | DET-ATT-003 | Policy Guild - Docs | Update determinization and VEX consensus docs to describe anchor requirements and precedence. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision pending: exact mapping between "anchored" status and VEX proof gate requirements.
|
||||
- Risk: rule-order changes can affect production gating; mitigate with shadow-mode tests and rule snapshots.
|
||||
- Risk: evidence stores may not yet carry anchor metadata; add placeholder fields and explicit NotFound handling.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: Determinization rule review with Policy + Signals.
|
||||
- TBD: Gate regression test run.
|
||||
@@ -0,0 +1,46 @@
|
||||
# Sprint 20260112-004-BINIDX - B2R2 LowUIR Perf Cache
|
||||
|
||||
## Topic & Scope
|
||||
- Integrate B2R2 LowUIR lifting into BinaryIndex semantic analysis so IR-based fingerprints are aligned with the B2R2 contract and deterministic across platforms.
|
||||
- Reduce hot-path cost by pooling lifters, warming key ISAs, and exposing bench and health signals for lift latency and readiness.
|
||||
- Add a function-level cache keyed by canonical IR hash and tool versions to reuse semantic fingerprints across scans in offline environments.
|
||||
- Update BinaryIndex docs to reflect LowUIR adapter behavior, caching rules, and operational endpoints.
|
||||
- **Working directory:** `src/BinaryIndex`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No upstream sprints required; scope confined to BinaryIndex libraries and web service.
|
||||
- Parallel execution is safe with `SPRINT_20260112_003_BE_csproj_audit_pending_apply.md` (different module and paths).
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/binary-index/architecture.md`
|
||||
- `docs/modules/binary-index/semantic-diffing.md`
|
||||
- `docs/technical/adr/0044-binary-delta-signatures.md`
|
||||
- `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | BINIDX-LIR-01 | TODO | LowUIR mapping spec | Scanner Guild - BinaryIndex | Implement a B2R2 LowUIR adapter for `IIrLiftingService` using B2R2 BinIR/BinLifter. Map LowUIR statements to existing IR models with deterministic ordering and invariant formatting. Register the adapter in DI so semantic and DeltaSig pipelines use it when available. Add tests asserting determinism and non-empty IR for supported ISAs. |
|
||||
| 2 | BINIDX-LIFTER-02 | TODO | Pool configuration | Scanner Guild - BinaryIndex | Add a bounded lifter pool with warm preload per ISA and update the B2R2 plugin to borrow/return lifters instead of creating per-call units. Add config options and tests for reuse and concurrency safety. |
|
||||
| 3 | BINIDX-CACHE-03 | TODO | Valkey cache + Postgres persistence plan | Scanner Guild - BinaryIndex | Add a function-level cache for canonical IR and semantic fingerprints keyed by `(isa, b2r2_version, normalization_recipe, canonical_ir_hash)`. Implement the cache in Valkey (TTL-based hot cache) and persist canonical IR fingerprint records in PostgreSQL. Do not introduce new storage engines. Define invalidation rules and TTLs. Add cache hit/miss tests. |
|
||||
| 4 | BINIDX-OPS-04 | TODO | Endpoint contract | Scanner Guild - BinaryIndex | Add ops endpoints with fixed routes and schemas: GET `/api/v1/ops/binaryindex/health` -> BinaryIndexOpsHealthResponse, POST `/api/v1/ops/binaryindex/bench/run` -> BinaryIndexBenchResponse, GET `/api/v1/ops/binaryindex/cache` -> BinaryIndexFunctionCacheStats, GET `/api/v1/ops/binaryindex/config` -> BinaryIndexEffectiveConfig. Report lifter warmness, bench latency, cache stats, and effective config. Ensure outputs are deterministic and ASCII-only. Add minimal integration tests. |
|
||||
| 5 | BINIDX-OPER-05 | TODO | Operand mapping | Scanner Guild - BinaryIndex | Improve B2R2 operand decoding to populate operand metadata used by normalization and IR mapping. Add targeted unit tests for representative instructions across x86 and ARM64. |
|
||||
| 6 | BINIDX-DOCS-06 | TODO | Doc updates | Scanner Guild - BinaryIndex | Update `docs/modules/binary-index/architecture.md`, `docs/modules/binary-index/semantic-diffing.md`, and `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md` to reflect the LowUIR adapter, lifter pool, cache rules, and new endpoints. Include determinism and offline constraints. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; scope defined for LowUIR adapter, lifter pool, cache, and bench/health endpoints. | Planning |
|
||||
| 2026-01-14 | Updated cache backend to Valkey for function cache with PostgreSQL persistence; removed SQLite/RocksDB references; fixed ASCII separators. | Planning |
|
||||
| 2026-01-14 | Aligned ops endpoints with UI/CLI contract (health, bench, cache, config). | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Valkey TTLs and PostgreSQL retention rules must stay aligned to prevent stale semantic fingerprints and mismatched cache keys.
|
||||
- LowUIR mapping may require extending existing IR models, which can change semantic hash stability; define versioning and migration strategy.
|
||||
- Lifter pooling and warm preload increase memory use; validate worker sizing and limits.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: Design review with Scanner Guild leads (confirm mapping, cache backend, and endpoints).
|
||||
@@ -0,0 +1,37 @@
|
||||
# Sprint 20260112.004.CLI · Reachability Trace Export Commands
|
||||
|
||||
## Topic & Scope
|
||||
- Extend CLI reachability commands to expose trace export formats (GraphSON or JSON/NDJSON) and runtime-confirmed flags.
|
||||
- Ensure outputs remain deterministic and offline-friendly; reuse canonical JSON for any hash computations.
|
||||
- Working directory: `src/Cli`. Evidence: new command flags, updated CLI docs, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_SCANNER_reachability_trace_runtime_evidence.md` for trace export endpoint and runtime-confirmed data.
|
||||
- Parallel-safe with Policy and Findings sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/cli/guides/commands/reachability.md`
|
||||
- `src/__Libraries/StellaOps.Canonical.Json/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-RT-001 | TODO | API ready | CLI Guild | Add CLI flags for trace export (format + output path) and surface runtime-confirmed flags in `stella reachability explain` JSON output. |
|
||||
| 2 | CLI-RT-002 | TODO | Docs | CLI Guild | Update `docs/modules/cli/guides/commands/reachability.md` with new flags and examples. |
|
||||
| 3 | CLI-RT-003 | TODO | Tests | CLI Guild | Add unit/integration tests covering deterministic output ordering and export behaviors. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- CLI must not infer timestamps; always use server-provided values.
|
||||
- Any hashing performed in CLI must use `StellaOps.Canonical.Json` with explicit serializer options.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: align output formats with Scanner contract.
|
||||
@@ -0,0 +1,35 @@
|
||||
# Sprint 20260112.004.DOC · CI/CD Gate Verification Step
|
||||
|
||||
## Topic & Scope
|
||||
- Document a required verification step in CI/CD gates that checks DSSE witness signatures and Rekor inclusion (or offline ledger).
|
||||
- Provide example commands for online and offline flows using `stella proof verify` and cosign equivalents.
|
||||
- Working directory: `docs`. Evidence: updated CI/CD flow and proof verification runbooks.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Parallel-safe with code sprints; no upstream dependencies required.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/flows/10-cicd-gate-flow.md`
|
||||
- `docs/operations/score-proofs-runbook.md`
|
||||
- `docs/operations/proof-verification-runbook.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOC-CICD-001 | TODO | Flow edits | Docs Guild | Update `docs/flows/10-cicd-gate-flow.md` to include DSSE witness verification and Rekor inclusion checks with offline fallback. |
|
||||
| 2 | DOC-CICD-002 | TODO | Runbook links | Docs Guild | Add concise command snippets to `docs/operations/score-proofs-runbook.md` and link to `docs/operations/proof-verification-runbook.md`. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Verification examples must be offline-friendly and avoid external URLs not already present.
|
||||
- CI gate examples must remain deterministic and avoid non-ASCII characters in commands.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm with Release Engineering that flow matches current CLI behavior.
|
||||
49
docs/implplan/SPRINT_20260112_004_FE_attested_score_ui.md
Normal file
49
docs/implplan/SPRINT_20260112_004_FE_attested_score_ui.md
Normal file
@@ -0,0 +1,49 @@
|
||||
# Sprint 20260112_004_FE - Attested Score UI
|
||||
|
||||
## Topic & Scope
|
||||
- Surface attested-reduction scoring outcomes in the Console UI: anchored evidence status, short-circuit reason, and hard-fail outcomes.
|
||||
- Extend EWS UI components to display reduction profile metadata and proof anchors (DSSE digest, Rekor log index/entry id).
|
||||
- Keep UI behavior deterministic and aligned with the scoring API schema and policy digest rules.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`; evidence: updated UI models, components, and tests; updated UI docs.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Signals and Findings sprints for new scoring fields and reduction-mode metadata.
|
||||
- Coordinate API schema changes with `docs/api/findings-scoring.md` updates to avoid UI contract drift.
|
||||
- Parallel execution is safe with backend work if UI starts after schema field names are confirmed.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/api/findings-scoring.md
|
||||
- docs/modules/ui/architecture.md
|
||||
- docs/modules/ui/components/README.md
|
||||
- docs/modules/ui/components/score-pill.md
|
||||
- docs/modules/ui/components/score-badge.md
|
||||
- docs/modules/ui/components/score-breakdown-popover.md
|
||||
- docs/modules/ui/components/findings-list.md
|
||||
- src/Web/StellaOps.Web/AGENTS.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-ATT-001 | TODO | API schema update | UI Guild - Frontend | Extend EWS TypeScript models and API client bindings to include reduction profile metadata, hard-fail status, and anchor fields. |
|
||||
| 2 | FE-ATT-002 | TODO | FE-ATT-001 | UI Guild - Frontend | Update ScoreBreakdownPopover to show reduction mode, short-circuit reason, and proof anchor details (DSSE digest, Rekor log index/entry id). |
|
||||
| 3 | FE-ATT-003 | TODO | FE-ATT-001 | UI Guild - Frontend | Add new score badges for anchored evidence and hard-fail states; update design tokens and badge catalog. |
|
||||
| 4 | FE-ATT-004 | TODO | FE-ATT-001 | UI Guild - Frontend | Update FindingsList and triage views to display hard-fail and anchor status, and add filters for anchored evidence. |
|
||||
| 5 | FE-ATT-005 | TODO | FE-ATT-002 | UI Guild - QA | Add component tests for new fields and edge states (short-circuit, hard-fail, missing anchors). |
|
||||
| 6 | FE-ATT-006 | TODO | FE-ATT-003 | UI Guild - Docs | Update UI component docs and triage UX guides to describe reduction-mode display and anchor semantics. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision pending: final UI field names for reduction mode and anchor metadata.
|
||||
- Risk: new badges may clash with existing bucket colors; update design tokens and accessibility notes.
|
||||
- Risk: UI filters may diverge from API flags; align on shared flag vocabulary before implementation.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: UI schema review with Findings and Signals owners.
|
||||
- TBD: UI component demo with score breakdown updates.
|
||||
@@ -0,0 +1,41 @@
|
||||
# Sprint 20260112.004.FE · Risk Line + Runtime Trace UI
|
||||
|
||||
## Topic & Scope
|
||||
- Add an always-visible risk line showing reachability score (0-1), runtime-confirmed badge, and Rekor timestamp link with graceful fallbacks.
|
||||
- Highlight runtime-confirmed edges in the reachability call graph and provide trace export actions (GraphSON or JSON/SARIF).
|
||||
- Working directory: `src/Web/StellaOps.Web`. Evidence: new UI component, updated API models, unit/e2e tests, and UI docs.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_SCANNER_reachability_trace_runtime_evidence.md` for new reachability fields and export endpoints.
|
||||
- Depends on `SPRINT_20260112_004_FINDINGS_evidence_graph_rekor_time.md` for Rekor timestamp link data.
|
||||
- Depends on `SPRINT_20260112_004_VULN_vex_override_workflow.md` for signed override metadata.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/UI_GUIDE.md`
|
||||
- `docs/modules/web/unified-triage-specification.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-RISK-001 | TODO | Scanner contract merge | UI Guild | Add a risk-line component in triage detail and wire fields: reachability score (0-1), runtime-confirmed badge, Rekor timestamp link; handle missing data gracefully. |
|
||||
| 2 | FE-RISK-002 | TODO | Runtime edge flags | UI Guild | Extend reachability models and renderer to highlight runtime-confirmed edges/steps; update legends and accessibility labels. |
|
||||
| 3 | FE-RISK-003 | TODO | Export API ready | UI Guild | Add trace export actions (GraphSON or JSON/SARIF) and download handling; update tests for deterministic output and UI behavior. |
|
||||
| 4 | FE-RISK-004 | TODO | Cross-module docs | UI Guild | Update `docs/UI_GUIDE.md` or `docs/modules/ui/architecture.md` to document the risk line and trace export UX. |
|
||||
| 5 | FE-RISK-005 | TODO | Signed override metadata | UI Guild | Surface signed VEX override status (DSSE badge, Rekor link, attestation details) in the VEX decision view and evidence panel; add tests. |
|
||||
| 6 | FE-RISK-006 | TODO | UX config toggle | UI Guild | Add a user setting toggle to enable/disable runtime-confirmed overlays and trace export actions; persist in UI preferences and document in UI guide. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Risk line should not introduce non-deterministic timestamps; use server-provided values only.
|
||||
- If runtime-confirmed data is unavailable, the UI must clearly show "unknown" rather than "false".
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: align risk-line copy and icons with security review.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112.004.FINDINGS · Evidence Graph Rekor Timestamp
|
||||
|
||||
## Topic & Scope
|
||||
- Extend evidence graph signature metadata to include Rekor integrated time and entry URL so UI can link to a verifiable timestamp.
|
||||
- Preserve existing signature verification semantics; only add fields and deterministic mapping from provenance.
|
||||
- Working directory: `src/Findings`. Evidence: updated contracts, builder mapping, tests, and openapi/schema docs.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on existing provenance data carrying Rekor integrated time (`DsseRekorInfo.IntegratedTime`).
|
||||
- Downstream: `SPRINT_20260112_004_FE_risk_line_runtime_trace_ui.md` consumes the timestamp link.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/findings-ledger/README.md`
|
||||
- `docs/modules/findings-ledger/schema.md`
|
||||
- `docs/modules/findings-ledger/openapi/findings-ledger.v1.yaml`
|
||||
- `docs/modules/findings-ledger/dsse-policy-linkage.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FIND-REKOR-001 | TODO | Provenance mapping | Findings Guild | Add `rekorIntegratedTime` (RFC3339) and `rekorEntryUrl` to evidence graph signature metadata; update contracts and JSON serialization. |
|
||||
| 2 | FIND-REKOR-002 | TODO | Builder update | Findings Guild | Map Rekor integrated time from DSSE provenance into evidence graph nodes; add unit tests for presence and determinism. |
|
||||
| 3 | FIND-REKOR-003 | TODO | Cross-module docs | Findings Guild | Update `docs/modules/findings-ledger/openapi/findings-ledger.v1.yaml` and `docs/modules/findings-ledger/schema-catalog.md` to document new fields. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- If Rekor integrated time is missing, responses must remain stable and UI should display "not logged".
|
||||
- Cross-module doc edits are required; note in PR descriptions when executed.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm UI link format for Rekor timestamp display.
|
||||
@@ -0,0 +1,48 @@
|
||||
# Sprint 20260112_004_LB - Attested Reduction Scoring
|
||||
|
||||
## Topic & Scope
|
||||
- Implement an optional attested-reduction scoring profile with strict precedence: anchored VEX not_affected/fixed -> score 0; anchored affected + runtime telemetry -> hard fail; otherwise compute `score = clamp(base_epss * (1 + R + T) - P, 0, 1)` with constants stored in config.
|
||||
- Extend EWS evidence models to carry anchor metadata (DSSE envelope digest, predicate type, Rekor log index/entry id, and anchoring flags) for VEX, patch proof, reachability, and telemetry inputs.
|
||||
- Preserve determinism with config-only constants, canonical policy digests, and explicit reduction audit fields in outputs.
|
||||
- **Working directory:** `src/Signals/StellaOps.Signals`; evidence: updated models, calculator, normalizers, tests. Allowed shared paths: `docs/api/findings-scoring.md`, `docs/technical/cicd/scoring-configuration.md`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Findings ledger evidence provider to supply anchor metadata for scoring inputs.
|
||||
- Coordinate anchor field names with Policy determinization sprint to keep evidence contracts consistent.
|
||||
- Parallel execution is safe with Policy and Findings sprints if doc updates are sequenced.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/api/findings-scoring.md
|
||||
- docs/technical/cicd/scoring-configuration.md
|
||||
- docs/VEX_CONSENSUS_GUIDE.md
|
||||
- docs/modules/scanner/binary-diff-attestation.md
|
||||
- docs-archived/product/advisories/24-Dec-2025 - Evidence-Weighted Score Model.md
|
||||
- src/Signals/AGENTS.md
|
||||
- src/Signals/StellaOps.Signals/AGENTS.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EWS-ATT-001 | TODO | Align anchor schema with Findings + Policy | Signals Guild - Backend | Add anchor metadata records and fields to EWS inputs (SourceTrustInput, BackportInput, ReachabilityInput, RuntimeInput, EvidenceWeightedScoreInput, FindingEvidence) and propagate in normalizer aggregator. |
|
||||
| 2 | EWS-ATT-002 | TODO | EWS-ATT-001 | Signals Guild - Backend | Extend EvidenceWeightPolicy with reduction config (precedence list, R/T/P constants, clamp bounds, hard-fail toggles) and include in canonical digest. |
|
||||
| 3 | EWS-ATT-003 | TODO | EWS-ATT-002 | Signals Guild - Backend | Implement attested-reduction scoring path in EvidenceWeightedScoreCalculator with short-circuit rules and hard-fail flag; keep existing EWS path unchanged unless enabled. |
|
||||
| 4 | EWS-ATT-004 | TODO | EWS-ATT-003 | Signals Guild - Backend | Adjust normalizers/aggregation to support EPSS-last behavior when reduction profile is enabled (skip or neutralize XPL when stronger anchored evidence exists). |
|
||||
| 5 | EWS-ATT-005 | TODO | EWS-ATT-003 | Signals Guild - Backend | Add unit tests for precedence order, hard-fail semantics, and policy digest determinism. |
|
||||
| 6 | EWS-ATT-006 | TODO | EWS-ATT-003 | Signals Guild - Docs | Update scoring configuration and API docs with the reduction profile and anchor fields. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision pending: final anchor field names and which predicates are required for "anchored" status.
|
||||
- Risk: overlapping doc edits with Findings sprint; mitigate by sequencing updates to `docs/api/findings-scoring.md`.
|
||||
- Risk: policy digest changes can invalidate cached scores; include migration note in docs and tests.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: Reduction profile design review with Signals + Findings owners.
|
||||
- TBD: Scoring API schema validation checkpoint.
|
||||
@@ -0,0 +1,36 @@
|
||||
# Sprint 20260112.004.LB · Doctor Evidence Integrity Checks
|
||||
|
||||
## Topic & Scope
|
||||
- Add Doctor checks that validate DSSE signatures, Rekor inclusion (or offline ledger), and evidence hash consistency.
|
||||
- Surface results in Doctor UI exports and keep outputs deterministic and offline-friendly.
|
||||
- Working directory: `src/__Libraries`. Evidence: new doctor checks, tests, and doc updates.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Parallel-safe with other sprints; can proceed independently once proof verification utilities are available.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/doctor/doctor-capabilities.md`
|
||||
- `docs/operations/score-proofs-runbook.md`
|
||||
- `src/__Libraries/StellaOps.Canonical.Json/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCHECK-001 | TODO | Check spec | Doctor Guild | Implement a security Doctor check that verifies DSSE signature validity and Rekor inclusion (or offline ledger) for a provided proof bundle or attestation; recompute hashes using `StellaOps.Canonical.Json`. |
|
||||
| 2 | DOCHECK-002 | TODO | Tests | Doctor Guild | Add unit/integration tests for deterministic check output, including offline mode. |
|
||||
| 3 | DOCHECK-003 | TODO | Cross-module docs | Doctor Guild | Update `docs/doctor/doctor-capabilities.md` to describe the new evidence integrity check. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Doctor checks must not call external networks; use local proof bundles or offline ledgers.
|
||||
- Ensure any evidence hash validation uses `StellaOps.Canonical.Json` with explicit serializer options and stable ordering.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm proof bundle inputs and UX in Doctor dashboard.
|
||||
40
docs/implplan/SPRINT_20260112_004_LB_evidence_card_core.md
Normal file
40
docs/implplan/SPRINT_20260112_004_LB_evidence_card_core.md
Normal file
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112-004-LB-evidence-card-core - Evidence Card Core
|
||||
|
||||
## Topic & Scope
|
||||
- Build a single-file evidence card export that packages SBOM excerpt, DSSE envelope, and Rekor receipt for a finding evidence pack; output is deterministic and offline-friendly.
|
||||
- Current state evidence: Evidence packs only export json/signedjson/markdown/html/pdf and do not carry Rekor receipts (`src/__Libraries/StellaOps.Evidence.Pack/Models/SignedEvidencePack.cs`, `src/__Libraries/StellaOps.Evidence.Pack/EvidencePackService.cs`).
|
||||
- Evidence to produce: EvidenceCard model, evidence-card export format, receipt wiring in signed packs, and determinism tests.
|
||||
- **Working directory:** `src/__Libraries/StellaOps.Evidence.Pack`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Attestor receipt types already present in `src/Attestor/StellaOps.Attestor/StellaOps.Attestor.Core/Rekor/RekorReceipt.cs`.
|
||||
- Parallel safe with remediation PR and UI sprints; no shared DB migrations or schema changes.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
- `docs/product/VISION.md`
|
||||
- `docs/modules/cli/guides/commands/evidence-bundle-format.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EVPCARD-LB-001 | TODO | None | Evidence Guild | Add EvidenceCard model and receipt metadata for single-file export. |
|
||||
| 2 | EVPCARD-LB-002 | TODO | EVPCARD-LB-001 | Evidence Guild | Implement evidence-card export format in EvidencePackService (SBOM excerpt + DSSE + receipt). |
|
||||
| 3 | EVPCARD-LB-003 | TODO | EVPCARD-LB-001 | Evidence Guild | Wire Rekor receipt capture into signed evidence packs using Attestor receipt types. |
|
||||
| 4 | EVPCARD-LB-004 | TODO | EVPCARD-LB-002 | Evidence Guild | Add determinism and export tests for evidence-card output. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide evidence-card schema fields and SBOM excerpt selection rules (size limits, deterministic ordering).
|
||||
- Rekor receipt availability in air-gap must be optional; define fallback behavior when receipts are missing.
|
||||
- Cross-module docs and API wiring occur in dependent sprints; note in commits when touching `docs/**`.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,45 @@
|
||||
# Sprint SPRINT_20260112_004_PLATFORM_setup_wizard_backend - Platform Setup Wizard Backend
|
||||
|
||||
## Topic & Scope
|
||||
- Replace the current UI mock setup wizard with real `/api/v1/setup/*` endpoints in Platform WebService; today only the UI mocks exist in `src/Web/StellaOps.Web/src/app/features/setup-wizard/services/setup-wizard-api.service.ts` and Platform only exposes `/api/v1/platform/onboarding/*`.
|
||||
- Provide deterministic setup session state (create, resume, execute, skip, finalize) with tenant scoping and "data as of" metadata for offline-first UX.
|
||||
- Align step ids and validation check ids with `docs/setup/setup-wizard-ux.md` and `docs/setup/setup-wizard-inventory.md`, and return Problem+JSON errors for UI handling.
|
||||
- Evidence expected: contract tests under `src/Platform/__Tests/`, updated docs in `docs/setup/*` and `docs/modules/platform/platform-service.md`.
|
||||
- **Working directory:** `src/Platform`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Authority scopes and Gateway policy wiring already present in Platform service.
|
||||
- Downstream: UI setup wizard wiring in `SPRINT_20260112_005_FE_setup_wizard_ui_wiring.md` consumes these endpoints.
|
||||
- Safe to run in parallel with SCM annotation sprints; no shared code paths.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Platform/AGENTS.md`
|
||||
- `src/Platform/StellaOps.Platform.WebService/AGENTS.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/platform/architecture.md`
|
||||
- `docs/modules/platform/platform-service.md`
|
||||
- `docs/setup/setup-wizard-ux.md`
|
||||
- `docs/setup/setup-wizard-inventory.md`
|
||||
- `docs/technical/testing/webservice-test-discipline.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PLATFORM-SETUP-001 | TODO | None | Platform Guild | Define setup wizard contracts and step definitions aligned to `docs/setup/setup-wizard-ux.md`; include deterministic ordering and explicit status enums. |
|
||||
| 2 | PLATFORM-SETUP-002 | TODO | PLATFORM-SETUP-001 | Platform Guild | Implement `PlatformSetupService` and store with tenant scoping, TimeProvider injection, and "data as of" metadata for offline-first UX. |
|
||||
| 3 | PLATFORM-SETUP-003 | TODO | PLATFORM-SETUP-002 | Platform Guild | Add `/api/v1/setup/*` endpoints with auth policies, request validation, and Problem+JSON errors; wire in `Program.cs`; add OpenAPI contract tests. |
|
||||
| 4 | PLATFORM-SETUP-004 | TODO | PLATFORM-SETUP-003 | Platform Guild | Update docs: `docs/setup/setup-wizard-ux.md`, `docs/setup/setup-wizard-inventory.md`, `docs/modules/platform/platform-service.md` with endpoint contracts and step list. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision needed: persist setup sessions in-memory with TTL vs Postgres; document chosen approach and its offline/HA implications.
|
||||
- Risk: step id mismatch between Platform setup steps and existing onboarding steps; align or provide mapping in contract.
|
||||
- Risk: `/api/v1/setup` path must be consistent with UI; changes require updating `src/Web/StellaOps.Web/src/app/features/setup-wizard/services/setup-wizard-api.service.ts`.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-16: Contract and endpoint shape review with Platform and UI leads.
|
||||
- 2026-01-21: Contract test and docs update review.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112.004.POLICY · Signed Override Enforcement
|
||||
|
||||
## Topic & Scope
|
||||
- Require signed VEX override attestations for policy evaluation and expose override signature status to rules.
|
||||
- Preserve existing VEX consensus semantics while tightening enforcement to signed inputs only.
|
||||
- Working directory: `src/Policy`. Evidence: engine updates, policy signals, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_VULN_vex_override_workflow.md` for signed override metadata.
|
||||
- Parallel-safe with Scanner and Findings sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/policy/guides/dsl.md`
|
||||
- `docs/modules/policy/guides/vex-trust-model.md`
|
||||
- `docs/VEX_CONSENSUS_GUIDE.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | POL-OVR-001 | TODO | Signed override model | Policy Guild | Add override signature validation (DSSE + optional Rekor inclusion) and map results to policy signals. |
|
||||
| 2 | POL-OVR-002 | TODO | DSL exposure | Policy Guild | Expose override signature status (`override_signed`, `override_rekor_verified`) to DSL/engine inputs; add unit tests. |
|
||||
| 3 | POL-OVR-003 | TODO | Cross-module docs | Policy Guild | Update `docs/modules/policy/guides/dsl.md` with signed override rules and examples. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Default enforcement should block unsigned overrides unless explicitly allowed by policy profile.
|
||||
- Rekor checks must honor offline mode and sealed-mode constraints.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm default enforcement profile with Security review.
|
||||
@@ -0,0 +1,44 @@
|
||||
# Sprint 20260112_004_POLICY - Unknowns Determinization + Grey Queue
|
||||
|
||||
## Topic & Scope
|
||||
- Normalize "unknown" outcomes as GuardedPass or Deferred with PendingDeterminization mapping; keep OpenVEX status as under_investigation for spec alignment.
|
||||
- Add deterministic reanalysis fingerprint and trigger metadata to policy outputs and the unknowns registry so replays are reproducible.
|
||||
- Detect conflicting evidence and route to Disputed state with manual adjudication gates.
|
||||
- Owning directory: src/Policy; evidence includes policy gate code, unknowns registry schema/API, tests, and docs updates.
|
||||
- Working directory: `src/Policy`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on event payloads from `docs/implplan/SPRINT_20260112_005_SCANNER_epss_reanalysis_events.md`, `docs/implplan/SPRINT_20260112_006_EXCITITOR_vex_change_events.md`, `docs/implplan/SPRINT_20260112_007_ATTESTOR_rekor_entry_events.md`, and `docs/implplan/SPRINT_20260112_008_SIGNALS_runtime_telemetry_events.md`.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Policy/AGENTS.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/policy/determinization-api.md`
|
||||
- `docs/VEX_CONSENSUS_GUIDE.md`
|
||||
- `docs/api/unknowns-api.md`
|
||||
- `docs/api/score-proofs-reachability-api-reference.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | POLICY-UNK-001 | TODO | Finalize fingerprint inputs list | Policy Guild - Team | Add deterministic reanalysis fingerprint builder and plumb into determinization gate results and policy verdict outputs. |
|
||||
| 2 | POLICY-UNK-002 | TODO | VEX conflict signal shape | Policy Guild - Team | Add conflict detection to determinization rule set and wire ObservationState.Disputed plus manual adjudication path. |
|
||||
| 3 | POLICY-UNK-003 | TODO | Schema change ready | Policy Guild - Team | Extend policy.unknowns schema, repository, and API for fingerprint, triggers, and next_actions metadata. |
|
||||
| 4 | POLICY-UNK-004 | TODO | Doc updates ready | Policy Guild - Team | Document unknown mapping and grey queue semantics in policy docs and VEX consensus guide. |
|
||||
| 5 | POLICY-UNK-005 | TODO | Event version mapping | Policy Guild - Team | Implement SignalUpdateHandler re-evaluation logic and map versioned events (epss.updated@1, etc.). |
|
||||
| 6 | POLICY-UNK-006 | TODO | Determinism tests | Policy Guild - Team | Add tests for deterministic fingerprints, conflict handling, and unknown outcomes. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide fingerprint input set (DSSE bundle digest, evidence digests, tool versions, product version) and canonical ordering for hashing.
|
||||
- Decide how Disputed maps to PolicyVerdictStatus in prod vs non-prod.
|
||||
- Event naming mismatch (epss.updated@1 vs epss.updated) must be resolved or mapped.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-16: Policy + Signals alignment review (Policy Guild, Signals Guild).
|
||||
- 2026-01-20: Docs review for determinization and VEX consensus.
|
||||
@@ -0,0 +1,47 @@
|
||||
# Sprint 20260112_004_SCANNER · Path Witness NodeHash
|
||||
|
||||
## Topic & Scope
|
||||
- Define a canonical node-hash and path-hash recipe so static and runtime evidence can join deterministically.
|
||||
- Extend Scanner reachability outputs (rich graph, subgraph, path witness, SARIF) to carry node hashes, top-K path nodes, and evidence URIs.
|
||||
- Keep DSSE payloads deterministic and backwards compatible where possible.
|
||||
- **Working directory:** `src/Scanner`. Allowed shared library: `src/__Libraries/StellaOps.Reachability.Core`. Evidence: updated tests, fixtures, and DSSE payloads.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on a locked node-hash recipe (coordinate with DOCS and SIGNALS sprints).
|
||||
- Predicate type locked to `https://stella.ops/predicates/path-witness/v1` with aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`.
|
||||
- Parallel execution is safe with Signals/Policy if the recipe and predicate type are aligned before merge.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/scanner/architecture.md
|
||||
- docs/contracts/witness-v1.md
|
||||
- docs/modules/reach-graph/guides/reachability.md
|
||||
- docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md
|
||||
- docs/technical/cicd/sarif-integration.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PW-SCN-001 | TODO | None | Guild - Scanner | Add canonical `NodeHashRecipe` and `PathHashRecipe` helpers in `src/__Libraries/StellaOps.Reachability.Core` with normalization rules and unit tests. |
|
||||
| 2 | PW-SCN-002 | TODO | PW-SCN-001 | Guild - Scanner | Extend `RichGraph` and `ReachabilitySubgraph` models to include node hash fields; compute and normalize in `RichGraphBuilder`; update determinism tests. |
|
||||
| 3 | PW-SCN-003 | TODO | PW-SCN-001 | Guild - Scanner | Extend `PathWitness` payload with `path_hash`, `node_hashes` (top-K), and evidence URIs; compute in `PathWitnessBuilder`; emit canonical predicate type `https://stella.ops/predicates/path-witness/v1` while honoring aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`; update tests. |
|
||||
| 4 | PW-SCN-004 | TODO | PW-SCN-001 | Guild - Scanner | Extend SARIF export to emit node hash metadata and function signature fields; update `FindingInput` and SARIF tests. |
|
||||
| 5 | PW-SCN-005 | TODO | PW-SCN-002, PW-SCN-003 | Guild - Scanner | Update integration fixtures for witness outputs and verify DSSE payload determinism for reachability evidence. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Created `src/__Libraries/StellaOps.Reachability.Core/AGENTS.md` to unblock shared library edits. | Planning |
|
||||
| 2026-01-14 | Locked path-witness predicate type to `https://stella.ops/predicates/path-witness/v1` with alias support (`stella.ops/pathWitness@v1`, `https://stella.ops/pathWitness/v1`). | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Node-hash recipe must be stable across languages; changes can invalidate existing graph digests.
|
||||
- Path witness schema changes may require a version bump; maintain alias support for `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`.
|
||||
- Top-K selection must be deterministic; define ordering in the helper to avoid drift.
|
||||
- Added `src/__Libraries/StellaOps.Reachability.Core/AGENTS.md`; keep it aligned with reachability contracts.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Node-hash recipe signoff and predicate type alignment review.
|
||||
@@ -0,0 +1,43 @@
|
||||
# Sprint 20260112.004.SCANNER · Reachability Trace + Runtime Evidence Export
|
||||
|
||||
## Topic & Scope
|
||||
- Add runtime-confirmed edge flags and reachability score output so the UI can show the risk line (score, runtime badge) without changing lattice semantics.
|
||||
- Provide a deterministic trace export (GraphSON or JSON/NDJSON) with evidence URIs and optional SARIF relatedLocations references for explainability.
|
||||
- Preserve hybrid posture: graph DSSE required, edge-bundle DSSE optional, runtime evidence optional and deterministic.
|
||||
- Working directory: `src/Scanner`. Evidence: updated reachability contracts, trace export endpoint, and tests; doc updates in `docs/api/signals/reachability-contract.md` and `docs/modules/scanner/architecture.md`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Downstream: `SPRINT_20260112_004_FE_risk_line_runtime_trace_ui.md` depends on the new fields and export endpoint.
|
||||
- Parallel-safe with Findings/Policy work; no shared migrations expected.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/api/signals/reachability-contract.md`
|
||||
- `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md`
|
||||
- `docs/technical/architecture/runtime-agents-architecture.md`
|
||||
- `src/__Libraries/StellaOps.Canonical.Json/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SCAN-RT-001 | TODO | Confirm FE data contract | Scanner Guild | Extend reachability response models to include `reachabilityScore` (0-1), per-edge/per-step `runtimeConfirmed`, and evidence URI lists; keep ordering deterministic. |
|
||||
| 2 | SCAN-RT-002 | TODO | Runtime evidence merger | Scanner Guild | Compute `runtimeConfirmed` annotations during static/runtime merge; add fixtures and unit tests proving stable output. |
|
||||
| 3 | SCAN-RT-003 | TODO | API export contract | Scanner Guild | Add trace export endpoint (GraphSON or JSON/NDJSON) with evidence URIs and optional SARIF relatedLocations references; canonicalize JSON via `StellaOps.Canonical.Json` before hashing or storing; add deterministic export tests. |
|
||||
| 4 | SCAN-RT-004 | TODO | Cross-module docs | Scanner Guild | Update `docs/api/signals/reachability-contract.md` and `docs/modules/scanner/architecture.md` to document new fields and export format. |
|
||||
| 5 | SCAN-RT-005 | TODO | Canonicalization contract | Scanner Guild | Document canonicalization and hash rules for trace exports in `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md` with explicit `StellaOps.Canonical.Json` usage. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Runtime-confirmed flags must be overlays only; do not alter lattice precedence or VEX recommendations.
|
||||
- Trace export format choice (GraphSON vs JSON/NDJSON) requires a single deterministic canonicalization strategy; use `StellaOps.Canonical.Json` with explicit serializer options (no CamelCase, default encoder) for hashing.
|
||||
- Cross-module doc edits are required; note in PR descriptions when executed.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: agree trace export format with UI and evidence graph consumers.
|
||||
@@ -0,0 +1,37 @@
|
||||
# Sprint 20260112.004.VULN · VEX Override Workflow + Attestation Linkage
|
||||
|
||||
## Topic & Scope
|
||||
- Extend VEX decision APIs to accept and return attestation references so overrides are signed and auditable.
|
||||
- Integrate Attestor to mint DSSE envelopes for operator decisions and persist envelope digests and Rekor info.
|
||||
- Working directory: `src/VulnExplorer`. Evidence: API model updates, Attestor integration, and test coverage.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_ATTESTOR_vex_override_predicate.md` for predicate and DSSE tooling.
|
||||
- Downstream: `SPRINT_20260112_004_POLICY_signed_override_enforcement.md` consumes signed override metadata.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/vuln-explorer/architecture.md`
|
||||
- `docs/VEX_CONSENSUS_GUIDE.md`
|
||||
- `docs/modules/vex-lens/architecture.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | VEX-OVR-001 | TODO | Model changes | Vuln Explorer Guild | Extend VEX decision request/response models to include attestation request parameters and attestation refs (envelope digest, rekor info, storage). |
|
||||
| 2 | VEX-OVR-002 | TODO | Attestor client | Vuln Explorer Guild | Call Attestor to mint DSSE override attestations on create/update; store returned digests and metadata; add tests. |
|
||||
| 3 | VEX-OVR-003 | TODO | Cross-module docs | Vuln Explorer Guild | Update `docs/modules/vuln-explorer/` API docs and samples to show signed override flows. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Attestation creation failures must be explicit and block unsigned overrides by default.
|
||||
- Attestation metadata must be deterministic and include evidence refs and scope.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: confirm API contract with UI and Policy Engine.
|
||||
37
docs/implplan/SPRINT_20260112_005_BE_evidence_card_api.md
Normal file
37
docs/implplan/SPRINT_20260112_005_BE_evidence_card_api.md
Normal file
@@ -0,0 +1,37 @@
|
||||
# Sprint 20260112-005-BE-evidence-card-api - Evidence Card API
|
||||
|
||||
## Topic & Scope
|
||||
- Extend AdvisoryAI evidence pack endpoints to expose evidence-card export and return stable headers for single-file receipts.
|
||||
- Current state evidence: EvidencePack export only supports json/markdown/html/pdf (`src/AdvisoryAI/StellaOps.AdvisoryAI.WebService/Endpoints/EvidencePackEndpoints.cs`).
|
||||
- Evidence to produce: API format wiring, OpenAPI update, and integration tests that verify content type and receipt presence.
|
||||
- **Working directory:** `src/AdvisoryAI`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_LB_evidence_card_core` for export implementation in Evidence.Pack.
|
||||
- Parallel safe with remediation PR sprint; no shared DB migrations.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/advisory-ai/guides/api.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EVPCARD-BE-001 | TODO | EVPCARD-LB-002 | Advisory AI Guild | Add evidence-card format parsing and export path to EvidencePackEndpoints. |
|
||||
| 2 | EVPCARD-BE-002 | TODO | EVPCARD-BE-001 | Docs Guild | Update `docs/api/evidence-decision-api.openapi.yaml` with evidence-card export format and response headers. |
|
||||
| 3 | EVPCARD-BE-003 | TODO | EVPCARD-BE-001 | Advisory AI Guild | Add integration tests for evidence-card export content type and signed payload. |
|
||||
| 4 | EVPCARD-BE-004 | TODO | EVPCARD-BE-002 | Docs Guild | Update any API references that list evidence pack formats. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide evidence-card file extension and content type (for example, application/json + .evidence.cdx.json).
|
||||
- Cross-module docs updates required under `docs/**`; note in commits when touched.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
41
docs/implplan/SPRINT_20260112_005_FE_binaryindex_ops_ui.md
Normal file
41
docs/implplan/SPRINT_20260112_005_FE_binaryindex_ops_ui.md
Normal file
@@ -0,0 +1,41 @@
|
||||
# Sprint 20260112-005-FE - BinaryIndex Ops UI
|
||||
|
||||
## Topic & Scope
|
||||
- Add a BinaryIndex ops view that surfaces lifter warmness, bench latency, and Valkey function cache stats for LowUIR-backed analysis.
|
||||
- Expose read-only configuration and effective settings (pool sizes, TTLs, semantic enablement, cache backend, persistence backend) so operators can verify user configuration is applied.
|
||||
- Integrate new API clients and route entry points, with deterministic rendering and accessible UI.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_BINIDX_b2r2_lowuir_perf_cache.md` for LowUIR, lifter pool, and ops endpoints.
|
||||
- Depends on `SPRINT_20260112_007_BINIDX_binaryindex_user_config.md` for config and stats endpoint contract.
|
||||
- Parallel execution is safe with other FE work that does not touch BinaryIndex routes.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/binary-index/architecture.md`
|
||||
- `docs/modules/binary-index/semantic-diffing.md`
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-BINOPS-01 | TODO | Ops endpoint contract | UI Guild - FE | Add TypeScript models and API client for BinaryIndex ops endpoints: GET `/api/v1/ops/binaryindex/health` (BinaryIndexOpsHealthResponse), POST `/api/v1/ops/binaryindex/bench/run` (BinaryIndexBenchResponse), GET `/api/v1/ops/binaryindex/cache` (BinaryIndexFunctionCacheStats), GET `/api/v1/ops/binaryindex/config` (BinaryIndexEffectiveConfig). Ensure error handling for offline and unauthorized modes. |
|
||||
| 2 | FE-BINOPS-02 | TODO | Route + layout | UI Guild - FE | Add a BinaryIndex Ops page at route `ops/binary-index` showing lifter warmness, bench latency summary, cache hit ratio, and effective settings. Expose a "Run bench sample" action that calls `/api/v1/ops/binaryindex/bench/run` and renders the response; disable with a visible reason when not permitted. |
|
||||
| 3 | FE-BINOPS-03 | TODO | UX for config visibility | UI Guild - FE | Add a read-only configuration panel showing pool sizes, TTLs, semantic enablement, cache backend (Valkey), persistence backend (PostgreSQL), and backend version. Keep outputs ASCII-only and redact secrets. |
|
||||
| 4 | FE-BINOPS-04 | TODO | Tests | UI Guild - FE | Add component tests for ops rendering, error states, and deterministic output; update route tests if needed. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; BinaryIndex ops UI and configuration visibility planned. | Planning |
|
||||
| 2026-01-14 | Locked ops endpoints, response schema names, and bench action exposure requirements. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Exposing config in UI must remain read-only and avoid secrets or tokens.
|
||||
- Bench actions can be load-generating; require explicit user action and rate limiting.
|
||||
- UI must degrade gracefully when ops endpoints are unavailable or disabled.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: UI review of ops layout and configuration visibility.
|
||||
@@ -0,0 +1,42 @@
|
||||
# Sprint SPRINT_20260112_005_FE_setup_wizard_ui_wiring - Setup Wizard UI Wiring
|
||||
|
||||
## Topic & Scope
|
||||
- Replace mocked setup wizard calls with real HTTP calls to `/api/v1/setup/*` and onboarding endpoints; current mocks are in `src/Web/StellaOps.Web/src/app/features/setup-wizard/services/setup-wizard-api.service.ts`.
|
||||
- Align wizard step ids, validation check displays, and error flows with `docs/setup/setup-wizard-ux.md` and Platform contracts; surface retry and "data as of" metadata.
|
||||
- Add deterministic unit tests for API service, state service, and wizard components; update UI docs to reflect live setup flows.
|
||||
- Evidence expected: passing unit tests, updated `docs/UI_GUIDE.md` and `docs/modules/ui/architecture.md`.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Platform setup endpoints from `SPRINT_20260112_004_PLATFORM_setup_wizard_backend.md`.
|
||||
- Can run in parallel with SCM annotation sprints once API shapes are stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/ui/information-architecture.md`
|
||||
- `docs/setup/setup-wizard-ux.md`
|
||||
- `docs/setup/setup-wizard-inventory.md`
|
||||
- `docs/UI_GUIDE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-SETUP-001 | TODO | PLATFORM-SETUP-003 | UI Guild | Replace mock calls in `SetupWizardApiService` with real HttpClient calls to `/api/v1/setup/*` and `/api/v1/platform/onboarding/*`; map Problem+JSON errors to UI messages. |
|
||||
| 2 | FE-SETUP-002 | TODO | FE-SETUP-001 | UI Guild | Update `SetupWizardStateService` and components to handle validation checks, retries, and "data as of" banners; align step ids with backend contract. |
|
||||
| 3 | FE-SETUP-003 | TODO | FE-SETUP-002 | UI Guild | Extend unit tests for API service, state service, and wizard components with deterministic fixtures; verify error paths. |
|
||||
| 4 | FE-SETUP-004 | TODO | FE-SETUP-003 | UI Guild | Update docs: `docs/UI_GUIDE.md` and `docs/modules/ui/architecture.md` to reflect live setup wizard flows and backend dependencies. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision needed: mapping between setup steps and onboarding steps for status display; confirm if a 1:1 mapping is required.
|
||||
- Risk: UI expects `/api/v1/setup` endpoints that are not yet live; sequencing with Platform sprint is required.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-17: UI contract alignment with Platform service.
|
||||
- 2026-01-22: Test and docs review.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112_005_SCANNER - EPSS Reanalysis Events
|
||||
|
||||
## Topic & Scope
|
||||
- Emit deterministic EPSS change events suitable for reanalysis triggers (delta thresholds, new scoring, and per-CVE updates).
|
||||
- Expose scanner tool versions and evidence digests needed for reanalysis fingerprints in policy outputs.
|
||||
- Update scanner docs and API references to describe EPSS-triggered reanalysis behavior.
|
||||
- Owning directory: src/Scanner; evidence includes event payloads, manifest/proof bundle changes, and tests.
|
||||
- Working directory: `src/Scanner`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for fingerprint consumer contract.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Scanner/AGENTS.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/modules/scanner/epss-integration.md`
|
||||
- `docs/api/score-proofs-reachability-api-reference.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SCAN-EPSS-001 | TODO | Delta threshold rules | Scanner Guild - Team | Emit deterministic EPSS change events that include per-CVE deltas and a stable ordering for delta > 0.2 triggers. |
|
||||
| 2 | SCAN-EPSS-002 | TODO | Fingerprint input contract | Scanner Guild - Team | Expose scanner tool versions and evidence digest references in scan manifests or proof bundles for policy fingerprinting. |
|
||||
| 3 | SCAN-EPSS-003 | TODO | Event naming alignment | Scanner Guild - Team | Align epss.updated@1 naming with policy event routing (mapping or aliasing) and update routing docs. |
|
||||
| 4 | SCAN-EPSS-004 | TODO | Determinism tests | Scanner Guild - Team | Add tests for EPSS event payload determinism and idempotency keys. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Confirm whether epss.updated@1 or a new epss.delta event is the canonical trigger.
|
||||
- Decide where tool version digests live (manifest vs proof bundle) to keep offline replay valid.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-17: EPSS event contract review (Scanner Guild, Policy Guild).
|
||||
@@ -0,0 +1,41 @@
|
||||
# Sprint 20260112_005_SIGNALS · Runtime NodeHash Evidence
|
||||
|
||||
## Topic & Scope
|
||||
- Extend runtime signal schemas to carry node-hash inputs and call-stack digests for deterministic joins.
|
||||
- Compute node hashes for observed call paths and expose them in runtime summaries.
|
||||
- Preserve deterministic ordering and test coverage for runtime evidence outputs.
|
||||
- **Working directory:** `src/Signals`. Allowed shared library: `src/__Libraries/StellaOps.Reachability.Core`. Evidence: updated schema tests and runtime merge tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on the canonical node-hash recipe (coordinate with PW-SCN-001).
|
||||
- Parallel execution is safe with Policy and Attestor once field names are aligned.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/signals/architecture.md
|
||||
- docs/technical/architecture/runtime-agents-architecture.md
|
||||
- docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md
|
||||
- docs/modules/reach-graph/guides/reachability.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PW-SIG-001 | TODO | PW-SCN-001 | Guild - Signals | Extend runtime schemas (`RuntimeCallEvent`, `ObservedCallPath`) with `function_sig`, `binary_digest`, `offset`, `node_hash`, and `callstack_hash`; add schema tests. |
|
||||
| 2 | PW-SIG-002 | TODO | PW-SIG-001 | Guild - Signals | Update `RuntimeSignalCollector` aggregation to compute node hashes and callstack hashes using the shared recipe; enforce deterministic ordering. |
|
||||
| 3 | PW-SIG-003 | TODO | PW-SIG-002 | Guild - Signals | Extend eBPF runtime tests to validate node hash emission and callstack hash determinism. |
|
||||
| 4 | PW-SIG-004 | TODO | PW-SIG-002 | Guild - Signals | Expose node-hash lists in runtime summaries and any Signals contracts used by reachability joins. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Runtime events may not always provide binary digests or offsets; define fallback behavior and mark missing fields explicitly.
|
||||
- Callstack hashing must be stable and privacy-safe; avoid embedding raw addresses in outputs.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Runtime schema review and node-hash recipe alignment.
|
||||
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112_006_ATTESTOR · Path Witness Predicate Support
|
||||
|
||||
## Topic & Scope
|
||||
- Normalize path-witness predicate naming to the best-in-class in-toto URI `https://stella.ops/predicates/path-witness/v1` and ensure Attestor accepts aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`.
|
||||
- Add schema validation and sample fixtures for the updated path-witness payload.
|
||||
- Preserve deterministic verification behavior and compatibility with existing attestations.
|
||||
- **Working directory:** `src/Attestor`. Evidence: updated predicate registry, schema, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Predicate type locked to `https://stella.ops/predicates/path-witness/v1` with aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`; depends on Scanner payload field lock.
|
||||
- Parallel execution is safe with Policy if predicate naming is settled early.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/attestor/architecture.md
|
||||
- docs/contracts/witness-v1.md
|
||||
- docs/modules/provenance/guides/inline-dsse.md
|
||||
- docs/security/trust-and-signing.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PW-ATT-001 | TODO | Predicate type locked (`https://stella.ops/predicates/path-witness/v1`) | Guild - Attestor | Update `PredicateTypeRouter` to accept `https://stella.ops/predicates/path-witness/v1` plus aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`; add routing tests. |
|
||||
| 2 | PW-ATT-002 | TODO | PW-ATT-001 | Guild - Attestor | Add path-witness schema in `src/Attestor/StellaOps.Attestor.Types/schemas` and sample payload in `src/Attestor/StellaOps.Attestor.Types/samples`; update schema tests. |
|
||||
| 3 | PW-ATT-003 | TODO | PW-ATT-002 | Guild - Attestor | Align statement models for canonical predicate type and alias mapping; ensure deterministic serialization in tests. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Locked path-witness predicate type to `https://stella.ops/predicates/path-witness/v1` with alias support (`stella.ops/pathWitness@v1`, `https://stella.ops/pathWitness/v1`). | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Canonical predicate type is `https://stella.ops/predicates/path-witness/v1`; keep `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1` as aliases to avoid breaking existing payloads.
|
||||
- Schema validation failures can block existing evidence ingestion if not staged carefully.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Predicate type alignment review with Scanner and Docs.
|
||||
42
docs/implplan/SPRINT_20260112_006_CLI_binaryindex_ops_cli.md
Normal file
42
docs/implplan/SPRINT_20260112_006_CLI_binaryindex_ops_cli.md
Normal file
@@ -0,0 +1,42 @@
|
||||
# Sprint 20260112-006-CLI - BinaryIndex Ops CLI
|
||||
|
||||
## Topic & Scope
|
||||
- Add CLI flags to enable semantic signatures so LowUIR data is actually used during delta signature authoring and matching.
|
||||
- Provide `stella obs binaryindex` commands to view BinaryIndex ops health, bench latency, Valkey function cache stats, and effective config.
|
||||
- Add user configuration options for BinaryIndex endpoint selection and default semantic behavior, with a dedicated base URL override that falls back to `BackendUrl`.
|
||||
- **Working directory:** `src/Cli`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_BINIDX_b2r2_lowuir_perf_cache.md` for LowUIR support and cache semantics.
|
||||
- Depends on `SPRINT_20260112_007_BINIDX_binaryindex_user_config.md` for ops endpoint contract.
|
||||
- Parallel execution is safe with other CLI sprints that do not touch BinaryIndex command groups.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/binary-index/architecture.md`
|
||||
- `docs/modules/binary-index/semantic-diffing.md`
|
||||
- `src/Cli/AGENTS.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-SEM-01 | TODO | SignatureOptions wiring | CLI Guild - CLI | Add `--semantic` flags to deltasig extract/author/match commands and wire them to `SignatureOptions.IncludeSemantic`. Update help text and ensure outputs include semantic fields when enabled. |
|
||||
| 2 | CLI-OPS-02 | TODO | Ops endpoint contract | CLI Guild - CLI | Add an `obs binaryindex` command group with subcommands `health`, `bench`, `cache`, and `config` that call the BinaryIndex web service endpoints: GET `/api/v1/ops/binaryindex/health`, POST `/api/v1/ops/binaryindex/bench/run`, GET `/api/v1/ops/binaryindex/cache`, GET `/api/v1/ops/binaryindex/config`. Support JSON and table output with deterministic ordering and ASCII-only output. |
|
||||
| 3 | CLI-CONF-03 | TODO | Configuration keys | CLI Guild - CLI | Add CLI configuration for BinaryIndex base URL and default semantic enablement. Use `StellaOps:BinaryIndex:BaseUrl` and env var `STELLAOPS_BINARYINDEX_URL`, plus a `--binaryindex-url` override; fall back to `BackendUrl` when unset. Document keys and defaults. |
|
||||
| 4 | CLI-TEST-04 | TODO | Tests | CLI Guild - CLI | Add unit and golden-output tests for semantic flags and ops commands, covering offline mode and error handling. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; BinaryIndex ops CLI and semantic flags planned. | Planning |
|
||||
| 2026-01-14 | Selected `obs binaryindex` command group and BinaryIndex base URL config key/override. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- CLI commands must respect offline mode and avoid hidden network calls.
|
||||
- Semantic flag changes output content; update golden tests and deterministic formatting.
|
||||
- Ops commands should fail fast when backend is unreachable without masking error context.
|
||||
- CLI ops command group chosen as `obs binaryindex` to align with existing observability patterns; ensure help text is explicit for operators.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: CLI command group review and output formatting sign-off.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112_006_EXCITITOR - VEX Change Events
|
||||
|
||||
## Topic & Scope
|
||||
- Emit deterministic VEX update events when OpenVEX statements are added, superseded, or conflict.
|
||||
- Include affected CVE and product keys plus provenance metadata to drive policy reanalysis.
|
||||
- Document the change event contract and conflict signaling in Excititor and VEX consensus docs.
|
||||
- Owning directory: src/Excititor; evidence includes event emission code, tests, and docs updates.
|
||||
- Working directory: `src/Excititor`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for event routing expectations.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Excititor/AGENTS.md`
|
||||
- `docs/modules/excititor/architecture.md`
|
||||
- `docs/VEX_CONSENSUS_GUIDE.md`
|
||||
- `docs/modules/policy/guides/vex-trust-model.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EXC-VEX-001 | TODO | Event contract draft | Excititor Guild - Team | Emit VEX update events with deterministic event IDs and stable ordering on statement changes. |
|
||||
| 2 | EXC-VEX-002 | TODO | Conflict rules | Excititor Guild - Team | Add conflict detection metadata and emit VEX conflict events for policy reanalysis. |
|
||||
| 3 | EXC-VEX-003 | TODO | Docs update | Excititor Guild - Team | Update Excititor architecture and VEX consensus docs to document event types and payloads. |
|
||||
| 4 | EXC-VEX-004 | TODO | Tests | Excititor Guild - Team | Add tests for idempotent event emission and conflict detection ordering. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide canonical event name (vex.updated vs vex.updated@1) and payload versioning.
|
||||
- Define conflict detection thresholds and source precedence in the event payload.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-17: VEX event contract review (Excititor Guild, Policy Guild).
|
||||
38
docs/implplan/SPRINT_20260112_006_FE_evidence_card_ui.md
Normal file
38
docs/implplan/SPRINT_20260112_006_FE_evidence_card_ui.md
Normal file
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112-006-FE-evidence-card-ui - Evidence Card UI
|
||||
|
||||
## Topic & Scope
|
||||
- Surface evidence-card export in the Console UI and client models so operators can download a single-file receipt.
|
||||
- Current state evidence: Evidence pack client supports Json/SignedJson/Markdown/Html/Pdf only (`src/Web/StellaOps.Web/src/app/core/api/evidence-pack.models.ts`, `src/Web/StellaOps.Web/src/app/core/api/evidence-pack.client.ts`).
|
||||
- Evidence to produce: UI export action, client enum wiring, tests, and UI guide update.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_005_BE_evidence_card_api` for API support.
|
||||
- Parallel safe with binary diff explain panel sprint if UI components stay isolated.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/UI_GUIDE.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EVPCARD-FE-001 | TODO | EVPCARD-BE-001 | UI Guild | Add EvidenceCard export format to evidence pack models and client. |
|
||||
| 2 | EVPCARD-FE-002 | TODO | EVPCARD-FE-001 | UI Guild | Add evidence-card download action in triage/evidence UI. |
|
||||
| 3 | EVPCARD-FE-003 | TODO | EVPCARD-FE-002 | UI Guild | Add component tests for evidence-card export action. |
|
||||
| 4 | EVPCARD-FE-004 | TODO | EVPCARD-FE-002 | Docs Guild | Update `docs/UI_GUIDE.md` with evidence-card download instructions. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Confirm where the evidence-card action lives in UI (triage evidence panel vs evidence pack viewer).
|
||||
- Ensure download respects offline mode and does not fetch external URLs.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint SPRINT_20260112_006_INTEGRATIONS_scm_annotations - SCM Annotations and GitLab Plugin
|
||||
|
||||
## Topic & Scope
|
||||
- Add SCM annotation client contracts for PR/MR comments and status checks so Scanner can post evidence summaries; existing GitHub App plugin only covers code scanning.
|
||||
- Implement GitHub App annotation client for comments and status checks, and add a GitLab plugin for equivalent MR feedback; `src/Integrations/__Plugins` currently lacks GitLab despite `src/Integrations/AGENTS.md` referencing it.
|
||||
- Enforce AuthRef-only secrets, deterministic ordering, and offline-friendly failure handling across plugins.
|
||||
- Evidence expected: plugin tests under `src/Integrations/__Tests`, updated integration docs, and contract updates.
|
||||
- **Working directory:** `src/Integrations`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Downstream: Scanner PR/MR annotation wiring in `SPRINT_20260112_007_SCANNER_pr_mr_annotations.md` depends on these clients.
|
||||
- Can run in parallel with setup wizard sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Integrations/AGENTS.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/release-orchestrator/README.md`
|
||||
- `docs/modules/release-orchestrator/modules/integration-hub.md`
|
||||
- `docs/flows/10-cicd-gate-flow.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | INTEGRATIONS-SCM-001 | TODO | None | Integrations Guild | Add SCM annotation client contracts in `StellaOps.Integrations.Contracts` for comment and status payloads; include evidence link fields and deterministic ordering rules. |
|
||||
| 2 | INTEGRATIONS-SCM-002 | TODO | INTEGRATIONS-SCM-001 | Integrations Guild | Implement GitHub App annotation client (PR comment + check run or commit status) using existing GitHub App auth; add unit tests with deterministic fixtures. |
|
||||
| 3 | INTEGRATIONS-SCM-003 | TODO | INTEGRATIONS-SCM-001 | Integrations Guild | Add GitLab plugin with MR comment and pipeline status posting; include AuthRef handling and offline-friendly error behavior; add unit tests. |
|
||||
| 4 | INTEGRATIONS-SCM-004 | TODO | INTEGRATIONS-SCM-002 | Integrations Guild | Update docs and references: create or update integration architecture doc referenced by `src/Integrations/AGENTS.md`, and extend `docs/flows/10-cicd-gate-flow.md` with PR/MR comment behavior. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision needed: create `docs/architecture/integrations.md` or update `src/Integrations/AGENTS.md` to point at the correct integration architecture doc.
|
||||
- Risk: GitLab API differences (MR comments vs pipeline statuses) need a unified contract; confirm field mapping in contract tests.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Contract design review (comments and status checks).
|
||||
- 2026-01-23: GitHub and GitLab plugin test review.
|
||||
@@ -0,0 +1,37 @@
|
||||
# Sprint 20260112_007_ATTESTOR - Rekor Entry Events
|
||||
|
||||
## Topic & Scope
|
||||
- Emit deterministic Rekor entry events when DSSE bundles are logged and inclusion proofs are available.
|
||||
- Include bundle digest, predicate type, and affected CVE or product hints to drive policy reanalysis.
|
||||
- Document Rekor event payloads and offline behavior in Attestor docs.
|
||||
- Owning directory: src/Attestor; evidence includes event emission code, tests, and docs updates.
|
||||
- Working directory: `src/Attestor`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for event routing expectations.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Attestor/AGENTS.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
- `docs/modules/attestor/rekor-verification-design.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | ATT-REKOR-001 | TODO | Event contract draft | Attestor Guild - Team | Emit Rekor entry events with deterministic IDs based on bundle digest and stable ordering. |
|
||||
| 2 | ATT-REKOR-002 | TODO | Evidence mapping | Attestor Guild - Team | Map predicate types to optional CVE or product hints for policy reanalysis triggers. |
|
||||
| 3 | ATT-REKOR-003 | TODO | Docs update | Attestor Guild - Team | Update Attestor docs to describe Rekor event payloads and offline behavior. |
|
||||
| 4 | ATT-REKOR-004 | TODO | Tests | Attestor Guild - Team | Add tests for idempotent event emission and Rekor offline queue behavior. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide whether to emit events only on inclusion proof success or also on queued submissions.
|
||||
- Ensure offline mode does not emit non-verifiable events.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Rekor event contract review (Attestor Guild, Policy Guild).
|
||||
@@ -0,0 +1,39 @@
|
||||
# Sprint 20260112-007-BE-remediation-pr-generator - Remediation PR Generator
|
||||
|
||||
## Topic & Scope
|
||||
- Implement deterministic PR/MR generation with PR.md template, rollback steps, and VEX claim context wired to remediation plans.
|
||||
- Current state evidence: PR generators return placeholders and do not apply remediation steps (`src/AdvisoryAI/StellaOps.AdvisoryAI/Remediation/GitHubPullRequestGenerator.cs`, `src/AdvisoryAI/StellaOps.AdvisoryAI/Remediation/IPullRequestGenerator.cs`).
|
||||
- Evidence to produce: SCM connector integration, PR template builder, updated remediation apply endpoint, tests, and API doc updates.
|
||||
- **Working directory:** `src/AdvisoryAI`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No hard dependencies; can run in parallel with evidence-card API sprint.
|
||||
- Requires SCM connector configuration in tenant settings; document assumptions in API docs.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/advisory-ai/guides/api.md`
|
||||
- `docs/modules/vuln-explorer/architecture.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | REMEDY-BE-001 | TODO | None | Advisory AI Guild | Implement deterministic PR.md template builder (steps, tests, rollback, VEX claim). |
|
||||
| 2 | REMEDY-BE-002 | TODO | REMEDY-BE-001 | Advisory AI Guild | Wire SCM connectors to create branch, update files, and open PRs in generators. |
|
||||
| 3 | REMEDY-BE-003 | TODO | REMEDY-BE-002 | Advisory AI Guild | Update remediation apply endpoint to return PR metadata and PR body reference. |
|
||||
| 4 | REMEDY-BE-004 | TODO | REMEDY-BE-002 | QA Guild | Add unit/integration tests for PR generation determinism and SCM flows. |
|
||||
| 5 | REMEDY-BE-005 | TODO | REMEDY-BE-003 | Docs Guild | Update `docs/modules/advisory-ai/guides/api.md` with PR generation details and examples. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Define canonical PR.md schema and required sections (tests, rollback, VEX claim).
|
||||
- SCM credentials and offline mode: ensure fallback to ticket-only flow when repo write is denied.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112-007-BINIDX - BinaryIndex User Configuration
|
||||
|
||||
## Topic & Scope
|
||||
- Define user configuration for B2R2 lifter pooling, LowUIR enablement, Valkey function cache behavior, and PostgreSQL persistence.
|
||||
- Expose ops and configuration endpoints for UI and CLI to view health, bench latency, cache stats, and effective settings with a fixed contract.
|
||||
- Document configuration keys and redaction rules for operator visibility.
|
||||
- **Working directory:** `src/BinaryIndex`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_004_BINIDX_b2r2_lowuir_perf_cache.md` for LowUIR and cache implementation details.
|
||||
- Parallel execution is safe with unrelated BinaryIndex work that does not modify ops endpoints or config classes.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/modules/binary-index/architecture.md`
|
||||
- `docs/architecture/EVIDENCE_PIPELINE_ARCHITECTURE.md`
|
||||
- `docs/modules/binary-index/semantic-diffing.md`
|
||||
- `src/BinaryIndex/AGENTS.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | BINIDX-CONF-01 | TODO | Config schema | Scanner Guild - BinaryIndex | Add options classes and appsettings sections for `BinaryIndex:B2R2Pool`, `BinaryIndex:SemanticLifting`, `BinaryIndex:FunctionCache` (Valkey), and `Postgres:BinaryIndex` (persistence). Validate ranges and defaults; keep ASCII-only log messages. |
|
||||
| 2 | BINIDX-OPS-02 | TODO | Endpoint contract | Scanner Guild - BinaryIndex | Add ops endpoints with fixed routes and schemas: GET `/api/v1/ops/binaryindex/health` -> BinaryIndexOpsHealthResponse, POST `/api/v1/ops/binaryindex/bench/run` -> BinaryIndexBenchResponse, GET `/api/v1/ops/binaryindex/cache` -> BinaryIndexFunctionCacheStats, GET `/api/v1/ops/binaryindex/config` -> BinaryIndexEffectiveConfig. Return lifter warmness, bench summary, function cache stats, and sanitized effective config with deterministic ordering. |
|
||||
| 3 | BINIDX-DOCS-03 | TODO | Docs update | Scanner Guild - BinaryIndex | Update BinaryIndex docs to describe configuration keys (including Valkey + Postgres), endpoint contracts, and redaction rules. Link the new endpoints from architecture docs. |
|
||||
| 4 | BINIDX-TEST-04 | TODO | Tests | Scanner Guild - BinaryIndex | Add tests for config binding and ops endpoints, including offline mode and missing Valkey scenarios. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; user configuration and ops endpoint exposure planned. | Planning |
|
||||
| 2026-01-14 | Locked config section names and ops endpoint contract for UI/CLI consumption. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Config endpoints must not expose secrets or internal identifiers that violate tenant boundaries.
|
||||
- Ops endpoints must remain stable for UI/CLI consumption; versioning may be required if schema changes.
|
||||
- Bench sampling must be rate-limited to avoid background load spikes.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: Config schema and ops endpoint contract review.
|
||||
40
docs/implplan/SPRINT_20260112_007_POLICY_path_gate_inputs.md
Normal file
40
docs/implplan/SPRINT_20260112_007_POLICY_path_gate_inputs.md
Normal file
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112_007_POLICY · Path Gate Inputs
|
||||
|
||||
## Topic & Scope
|
||||
- Extend policy reachability inputs with pathHash and nodeHash lists for enforceable path gates.
|
||||
- Expose new fields in the policy DSL and evaluation context with deterministic handling.
|
||||
- Add tests and sample policies that enforce path-level reachability and runtime freshness.
|
||||
- **Working directory:** `src/Policy`. Evidence: updated models, DSL completion, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner sprint payload fields and Docs contract updates for reachability input schema.
|
||||
- Parallel execution is safe with Attestor once predicate naming is stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/07_HIGH_LEVEL_ARCHITECTURE.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/policy/architecture.md
|
||||
- docs/modules/policy/contracts/reachability-input-contract.md
|
||||
- docs/modules/policy/schemas/reachability-input.schema.json
|
||||
- docs/modules/policy/guides/verdict-rationale.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PW-POL-001 | TODO | Scanner field alignment | Guild - Policy | Extend policy models to accept `path_hash`, `node_hashes`, and runtime freshness fields; add unit tests for determinism and parsing. |
|
||||
| 2 | PW-POL-002 | TODO | PW-POL-001 | Guild - Policy | Update DSL completion and evaluation context to expose `reachability.pathHash`, `reachability.nodeHash`, and runtime age fields; add tests. |
|
||||
| 3 | PW-POL-003 | TODO | PW-POL-002 | Guild - Policy | Add policy fixtures demonstrating path-level gates and runtime freshness enforcement. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Policy field naming must match scanner outputs and contracts to avoid evaluation mismatches.
|
||||
- Runtime freshness semantics must align with existing staleness monitors.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Policy gate review with product and security stakeholders.
|
||||
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint SPRINT_20260112_007_SCANNER_pr_mr_annotations - Scanner PR and MR Annotations
|
||||
|
||||
## Topic & Scope
|
||||
- Wire scanner webhook handling to generate PR/MR annotations and post them via Integrations SCM annotation clients; `PrAnnotationService` is implemented but not called.
|
||||
- Extend PR/MR comment format to include evidence anchors (DSSE digest, witness id, verify commands) and enforce ASCII-only output with deterministic ordering.
|
||||
- Add unit and integration tests for comment formatting and webhook flows; update CI/CD docs to reflect the new evidence-first annotations.
|
||||
- Evidence expected: tests under `src/Scanner/__Tests`, updated `docs/flows/10-cicd-gate-flow.md`, and updated `docs/full-features-list.md`.
|
||||
- **Working directory:** `src/Scanner`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on SCM annotation clients and GitLab plugin from `SPRINT_20260112_006_INTEGRATIONS_scm_annotations.md`.
|
||||
- Can run in parallel with setup wizard sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Scanner/AGENTS.md`
|
||||
- `src/Scanner/StellaOps.Scanner.WebService/AGENTS.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/flows/10-cicd-gate-flow.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SCANNER-PR-001 | TODO | INTEGRATIONS-SCM-001 | Scanner Guild | Integrate `PrAnnotationService` into `WebhookEndpoints` for GitHub and GitLab merge request events; derive base/head graph ids and handle missing data paths. |
|
||||
| 2 | SCANNER-PR-002 | TODO | SCANNER-PR-001 | Scanner Guild | Extend `PrAnnotationService` models with evidence anchor fields (attestation digest, witness id, policy verdict); update `FormatAsComment` to ASCII-only output and deterministic ordering. |
|
||||
| 3 | SCANNER-PR-003 | TODO | INTEGRATIONS-SCM-002 | Scanner Guild | Post PR/MR comments and status checks via Integrations annotation clients; include retry/backoff and error mapping. |
|
||||
| 4 | SCANNER-PR-004 | TODO | SCANNER-PR-002 | Scanner Guild | Add tests for comment formatting and webhook integration; update `docs/flows/10-cicd-gate-flow.md` and `docs/full-features-list.md` for PR/MR evidence annotations. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision needed: exact evidence anchor fields to include in PR/MR comments (DSSE digest, witness link, verify command format); confirm with Attestor and Policy owners.
|
||||
- Risk: existing comment format includes non-ASCII glyphs; must be replaced with ASCII-only output to comply with determinism rules.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-19: Evidence anchor format review with Attestor and Policy owners.
|
||||
- 2026-01-24: Scanner webhook and annotation integration review.
|
||||
@@ -0,0 +1,42 @@
|
||||
# Sprint 20260112_008_DOCS · Path Witness Contracts
|
||||
|
||||
## Topic & Scope
|
||||
- Update witness and reachability documentation to define node-hash and path-hash fields and evidence URIs.
|
||||
- Document SARIF property keys for node-hash joins and runtime evidence linkage.
|
||||
- Align Signals and Policy contracts with new runtime and gating fields.
|
||||
- **Working directory:** `docs`. Evidence: updated contract docs, schemas, and cross-links.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner and Signals sprints for final field names; predicate type is locked to `https://stella.ops/predicates/path-witness/v1` with aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`.
|
||||
- Parallel execution is safe with code sprints if doc changes are staged after field names are locked.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/ARCHITECTURE_OVERVIEW.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/contracts/witness-v1.md
|
||||
- docs/modules/reach-graph/guides/reachability.md
|
||||
- docs/technical/cicd/sarif-integration.md
|
||||
- docs/api/signals/reachability-contract.md
|
||||
- docs/modules/policy/contracts/reachability-input-contract.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | PW-DOC-001 | TODO | Predicate type locked (`https://stella.ops/predicates/path-witness/v1`) | Guild - Docs | Update `docs/contracts/witness-v1.md` with canonical predicate type, alias list, node-hash recipe, pathHash, top-K handling, and evidence URI fields. |
|
||||
| 2 | PW-DOC-002 | TODO | PW-DOC-001 | Guild - Docs | Update reachability and reachgraph docs to explain node-hash joins and runtime evidence linkage. |
|
||||
| 3 | PW-DOC-003 | TODO | PW-DOC-001 | Guild - Docs | Update SARIF integration docs with `stellaops/*` property keys for node hash metadata and evidence URIs. |
|
||||
| 4 | PW-DOC-004 | TODO | PW-DOC-002 | Guild - Docs | Update Signals and Policy contracts to include new runtime fields, node-hash lists, and path gating semantics. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Locked path-witness predicate type to `https://stella.ops/predicates/path-witness/v1` with alias support (`stella.ops/pathWitness@v1`, `https://stella.ops/pathWitness/v1`). | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Contract updates must mirror code changes and the canonical predicate type to avoid divergence and stale guidance.
|
||||
- Keep schema examples deterministic and offline-friendly (use cas:// URIs and fixed hashes).
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Documentation review and cross-link validation.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112-008-LB-binary-diff-evidence-models - Binary Diff Evidence Models
|
||||
|
||||
## Topic & Scope
|
||||
- Extend evidence bundle models to capture binary diff evidence and include it in bundle predicates and adapters.
|
||||
- Current state evidence: EvidenceBundle and adapter omit binary diff evidence (`src/__Libraries/StellaOps.Evidence.Bundle/EvidenceBundle.cs`, `src/__Libraries/StellaOps.Evidence.Core/Adapters/EvidenceBundleAdapter.cs`).
|
||||
- Evidence to produce: BinaryDiffEvidence model, bundle builder updates, adapter payload schema, and tests.
|
||||
- **Working directory:** `src/__Libraries/StellaOps.Evidence.Bundle`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No hard dependencies; scanner export sprint depends on these model updates.
|
||||
- Parallel safe with evidence-card sprints; no shared DB migrations.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/scanner/binary-diff-attestation.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | BINDIFF-LB-001 | TODO | None | Evidence Guild | Add BinaryDiffEvidence model and update EvidenceBundlePredicate fields and status summary. |
|
||||
| 2 | BINDIFF-LB-002 | TODO | BINDIFF-LB-001 | Evidence Guild | Update EvidenceBundleBuilder to include binary diff hashes and completeness scoring. |
|
||||
| 3 | BINDIFF-LB-003 | TODO | BINDIFF-LB-001 | Evidence Guild | Extend EvidenceBundleAdapter with binary diff payload schema. |
|
||||
| 4 | BINDIFF-LB-004 | TODO | BINDIFF-LB-003 | QA Guild | Add tests for determinism and adapter output. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide binary diff payload schema for adapter output (fields, naming, and hash placement).
|
||||
- Ensure any new fields remain deterministic and ASCII-only.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112_008_SIGNALS - Runtime Telemetry Events
|
||||
|
||||
## Topic & Scope
|
||||
- Emit runtime.updated events when exploit telemetry or runtime observations change for a CVE and product pair.
|
||||
- Attach deterministic evidence digests and subject keys so policy can re-evaluate unknowns.
|
||||
- Document runtime event payloads and reanalysis triggers for the Signals module.
|
||||
- Owning directory: src/Signals; evidence includes event emission code, tests, and docs updates.
|
||||
- Working directory: `src/Signals`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for event routing expectations.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Signals/AGENTS.md`
|
||||
- `docs/modules/signals/guides/unknowns-ranking.md`
|
||||
- `docs/api/signals/reachability-contract.md`
|
||||
- `docs/modules/telemetry/guides/policy.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SIG-RUN-001 | TODO | Event contract draft | Signals Guild - Team | Define runtime.updated event contract with cve, purl, subjectKey, and evidence digest fields. |
|
||||
| 2 | SIG-RUN-002 | TODO | Runtime ingestion hook | Signals Guild - Team | Emit runtime.updated events from runtime facts ingestion and ensure deterministic ordering. |
|
||||
| 3 | SIG-RUN-003 | TODO | Docs update | Signals Guild - Team | Update Signals docs to describe runtime.updated triggers and payloads. |
|
||||
| 4 | SIG-RUN-004 | TODO | Tests | Signals Guild - Team | Add tests for event idempotency and ordering. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide where runtime.updated should be emitted (Signals ingestion vs Zastava).
|
||||
- Confirm event payload size limits for runtime evidence digests.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Runtime event contract review (Signals Guild, Policy Guild).
|
||||
38
docs/implplan/SPRINT_20260112_009_FE_unknowns_queue_ui.md
Normal file
38
docs/implplan/SPRINT_20260112_009_FE_unknowns_queue_ui.md
Normal file
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112_009_FE - Unknowns Grey Queue UI
|
||||
|
||||
## Topic & Scope
|
||||
- Extend unknowns queue UI to display reanalysis fingerprint, trigger list, and next actions from the policy API.
|
||||
- Surface manual adjudication state and grey queue semantics for operators.
|
||||
- Update UI docs and tests to cover new fields and deterministic ordering.
|
||||
- Owning directory: src/Web/StellaOps.Web; evidence includes UI components, tests, and docs updates.
|
||||
- Working directory: `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for API field availability.
|
||||
- CC 20260112_004-009 remain independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
- `docs/UI_GUIDE.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/api/unknowns-api.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-UNK-001 | TODO | API schema update | Web Guild - Team | Update unknowns service models and API calls to include fingerprint, triggers, and next_actions fields. |
|
||||
| 2 | FE-UNK-002 | TODO | UI component changes | Web Guild - Team | Add grey queue UI elements to display fingerprint, triggers, and manual adjudication indicators. |
|
||||
| 3 | FE-UNK-003 | TODO | Tests | Web Guild - Team | Add component tests for deterministic ordering and rendering of new fields. |
|
||||
| 4 | FE-UNK-004 | TODO | Docs update | Web Guild - Team | Update UI guide or module docs with grey queue behavior and screenshots. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide how to visually distinguish grey queue vs existing HOT/WARM/COLD bands.
|
||||
- Ensure large trigger lists remain readable on mobile.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: UI review with design and policy stakeholders.
|
||||
@@ -0,0 +1,39 @@
|
||||
# Sprint 20260112-009-SCANNER-binary-diff-bundle-export - Binary Diff Evidence Export
|
||||
|
||||
## Topic & Scope
|
||||
- Include binary diff evidence in unified evidence responses and evidence bundle archives (binary-diff.json, binary-diff.dsse.json, delta-proof.json).
|
||||
- Current state evidence: Unified evidence contracts and bundle exporter omit binary diff fields (`src/Scanner/StellaOps.Scanner.WebService/Contracts/UnifiedEvidenceContracts.cs`, `src/Scanner/StellaOps.Scanner.WebService/Services/EvidenceBundleExporter.cs`).
|
||||
- Evidence to produce: updated contracts, exporter file generation, tests, and evidence bundle format doc update.
|
||||
- **Working directory:** `src/Scanner/StellaOps.Scanner.WebService`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_008_LB_binary_diff_evidence_models` for core model additions.
|
||||
- Parallel safe with UI sprint once API contract is stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/scanner/binary-diff-attestation.md`
|
||||
- `docs/modules/cli/guides/commands/evidence-bundle-format.md`
|
||||
- `docs/modules/scanner/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | BINDIFF-SCAN-001 | TODO | BINDIFF-LB-001 | Scanner Guild | Extend UnifiedEvidenceResponseDto with binary diff evidence and attestation refs. |
|
||||
| 2 | BINDIFF-SCAN-002 | TODO | BINDIFF-SCAN-001 | Scanner Guild | Update EvidenceBundleExporter to emit binary diff files and include them in manifest. |
|
||||
| 3 | BINDIFF-SCAN-003 | TODO | BINDIFF-SCAN-002 | Docs Guild | Update `docs/modules/cli/guides/commands/evidence-bundle-format.md` to list binary diff files. |
|
||||
| 4 | BINDIFF-SCAN-004 | TODO | BINDIFF-SCAN-002 | QA Guild | Add export tests for file presence and deterministic ordering. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide how to map binary diff attestations into unified evidence (IDs, file names, and ordering).
|
||||
- Ensure bundle export remains deterministic and offline friendly when attestations are missing.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,36 @@
|
||||
# Sprint SPRINT_20260112_010_ATTESTOR_ai_code_guard_predicate · AI Code Guard attestation
|
||||
|
||||
## Topic & Scope
|
||||
- Define AI code guard predicate schema and register it in Attestor types.
|
||||
- Add DSSE wrapping and verification rules for guard evidence bundles.
|
||||
- Provide deterministic fixtures and tests for predicate serialization.
|
||||
- **Working directory:** `src/Attestor`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner evidence model from `SPRINT_20260112_010_SCANNER_ai_code_guard_core.md`.
|
||||
- Docs updates tracked in `SPRINT_20260112_010_DOCS_ai_code_guard_docs.md`.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Attestor/AGENTS.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | ATTESTOR-AIGUARD-001 | TODO | SCANNER-AIGUARD-006 | Attestor Guild | Define AI code guard predicate schema and models (subject, inputs, findings, verdicts, overrides). |
|
||||
| 2 | ATTESTOR-AIGUARD-002 | TODO | ATTESTOR-AIGUARD-001 | Attestor Guild | Register predicate in Attestor type registry and verification pipeline; reject invalid shapes deterministically. |
|
||||
| 3 | ATTESTOR-AIGUARD-003 | TODO | ATTESTOR-AIGUARD-002 | Attestor Guild | Add DSSE fixture samples and tests for canonical serialization and verification. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide predicate type URI and versioning strategy to align with existing attestation naming.
|
||||
- Risk: predicate must avoid embedding non-deterministic fields (timestamps should be inputs, not wall-clock).
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Predicate schema review with Scanner and Policy owners.
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint SPRINT_20260112_010_CLI_ai_code_guard_command · AI Code Guard CLI
|
||||
|
||||
## Topic & Scope
|
||||
- Add `stella guard run` command to execute AI code guard checks via Scanner and emit deterministic outputs.
|
||||
- Support JSON, SARIF, and GitLab report formats for CI integrations.
|
||||
- Add fixtures and golden tests for deterministic output ordering and offline behavior.
|
||||
- **Working directory:** `src/Cli`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner guard endpoint from `SPRINT_20260112_010_SCANNER_ai_code_guard_core.md`.
|
||||
- Depends on policy signal names from `SPRINT_20260112_010_POLICY_ai_code_guard_policy.md`.
|
||||
- Can run in parallel with docs and UI once API contracts are stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Cli/AGENTS.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/implplan/AGENTS.md`
|
||||
- `docs/API_CLI_REFERENCE.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-AIGUARD-001 | TODO | SCANNER-AIGUARD-006 | CLI Guild | Add `guard run` command with policy file input, base/head refs, and sealed mode flags; wire to Scanner endpoint. |
|
||||
| 2 | CLI-AIGUARD-002 | TODO | CLI-AIGUARD-001 | CLI Guild | Implement deterministic output renderers for JSON, SARIF, and GitLab formats. |
|
||||
| 3 | CLI-AIGUARD-003 | TODO | CLI-AIGUARD-002 | CLI Guild | Add golden fixtures and tests for guard outputs; validate ordering, timestamps, and ASCII-only output. |
|
||||
| 4 | CLI-AIGUARD-004 | TODO | CLI-AIGUARD-002 | CLI Guild | Update CLI help and error codes; sync docs via `SPRINT_20260112_010_DOCS_ai_code_guard_docs.md`. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide whether `guard run` is core CLI or a plugin command; impacts packaging and offline kit contents.
|
||||
- Risk: SARIF schema mapping must align with Integrations GitHub code scanning requirements.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-19: CLI flag review with Scanner owners.
|
||||
- 2026-01-24: SARIF format validation with Integrations owners.
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112_010_CLI - Unknowns Grey Queue CLI Parity
|
||||
|
||||
## Topic & Scope
|
||||
- Close the CLI gap for grey queue outcomes so operators can view fingerprints, triggers, and next actions without the UI.
|
||||
- Align CLI verbs with the Unknowns runbook (summary/show/proof/export/triage) and keep outputs deterministic.
|
||||
- Wire CLI to the policy unknowns API and new fields introduced by the grey queue determinization work.
|
||||
- Owning directory: src/Cli/StellaOps.Cli; evidence includes command handlers, tests, and runbook updates.
|
||||
- **Working directory:** `src/Cli`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for unknowns schema fields and policy API updates.
|
||||
- CC 20260112_010 remains independent of other sprints aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Cli/AGENTS.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/operations/unknowns-queue-runbook.md`
|
||||
- `docs/api/unknowns-api.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-UNK-001 | TODO | Policy API fields | CLI Guild - Team | Add `stella unknowns summary` and `stella unknowns show` with fingerprint, triggers, next_actions, and evidence refs. |
|
||||
| 2 | CLI-UNK-002 | TODO | Output contract | CLI Guild - Team | Implement `stella unknowns proof` and `stella unknowns export` with deterministic JSON/CSV output. |
|
||||
| 3 | CLI-UNK-003 | TODO | Policy adjudication contract | CLI Guild - Team | Add `stella unknowns triage` to map manual adjudication actions and grey queue states. |
|
||||
| 4 | CLI-UNK-004 | TODO | Docs sync | CLI Guild - Team | Update `docs/operations/unknowns-queue-runbook.md` and CLI reference to match actual verbs and flags. |
|
||||
| 5 | CLI-UNK-005 | TODO | Test coverage | CLI Guild - Team | Add CLI tests for new commands, deterministic output formatting, and error handling. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide which policy unknowns fields are required for `proof` output vs best-effort (evidence refs only).
|
||||
- Confirm how `triage` maps to policy states (Disputed vs ManualReviewRequired) and required inputs.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-16: CLI and Policy contract review (CLI Guild, Policy Guild).
|
||||
- 2026-01-20: Runbook alignment review with Ops.
|
||||
47
docs/implplan/SPRINT_20260112_010_DOCS_ai_code_guard_docs.md
Normal file
47
docs/implplan/SPRINT_20260112_010_DOCS_ai_code_guard_docs.md
Normal file
@@ -0,0 +1,47 @@
|
||||
# Sprint SPRINT_20260112_010_DOCS_ai_code_guard_docs · AI Code Guard docs and benchmarks
|
||||
|
||||
## Topic & Scope
|
||||
- Document the AI code guard concept, policy matrix, and override workflow with links to Scanner, Policy, CLI, and Integrations surfaces.
|
||||
- Add high-level positioning updates in key features and architecture references; include cross-links from the legacy index file.
|
||||
- Publish deterministic benchmark fixtures (policy YAML and CI snippets) and reference them from the detailed docs.
|
||||
- Capture evidence expectations and determinism constraints for offline use.
|
||||
- **Working directory:** `docs`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Can run in parallel with implementation sprints; update links as endpoints stabilize.
|
||||
- Depends on advisory approval for AI code guard naming and scope.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCS-AIGUARD-001 | DONE | - | Docs Guild | Update `docs/key-features.md` and `docs/ARCHITECTURE_OVERVIEW.md` with AI code guard positioning and cross-links to detailed docs. |
|
||||
| 2 | DOCS-AIGUARD-002 | DONE | DOCS-AIGUARD-001 | Docs Guild | Add detailed docs: `docs/modules/scanner/operations/ai-code-guard.md` and `docs/modules/policy/guides/ai-code-guard-policy.md` (checks, evidence, policy matrix, override rules). |
|
||||
| 3 | DOCS-AIGUARD-003 | DONE | DOCS-AIGUARD-002 | Docs Guild | Add deterministic fixtures under `docs/benchmarks/ai-code-guard/` for `.stellaops.yml` and CI snippets; link from docs. |
|
||||
| 4 | DOCS-AIGUARD-004 | DONE | DOCS-AIGUARD-002 | Docs Guild | Update flow and CLI references: `docs/flows/10-cicd-gate-flow.md`, `docs/API_CLI_REFERENCE.md`, `docs/flows/06-export-flow.md`. |
|
||||
| 5 | DOCS-AIGUARD-005 | DONE | DOCS-AIGUARD-004 | Docs Guild | Archive advisory to `docs-archived/product/advisories/` and add supersedes or extends notes if overlaps found. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Completed AI code guard doc sync, fixtures, flow updates, and advisory archive. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide whether "AI code guard" is a Scanner feature name or a Policy gate name; docs must match product naming.
|
||||
- Confirm license policy matrix defaults (allow/review/block lists) and override roles before publishing docs.
|
||||
- Risk: endpoints and CLI flags may change during implementation; mark docs as draft until API contracts land.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Docs outline review with Scanner and Policy owners.
|
||||
- 2026-01-24: Cross-link validation and fixture review.
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint SPRINT_20260112_010_DOCS_cli_command_name_sweep · CLI command name sweep analysis
|
||||
|
||||
## Topic & Scope
|
||||
- Confirm the canonical CLI command name is `stella` across product docs, flows, and operator guides.
|
||||
- Inventory all references to `stellaops` in docs and classify each as: must replace, keep as legacy alias, or ambiguous.
|
||||
- Produce a deterministic sweep report listing file paths, context, and recommended action.
|
||||
- Define follow-up tasks for replacements and exception handling without performing implementation in this sprint.
|
||||
- **Working directory:** `docs`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No runtime dependencies; can run in parallel with other docs sprints.
|
||||
- Requires coordination with CLI guild to confirm any legacy alias policy.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/API_CLI_REFERENCE.md`
|
||||
- `docs/flows/10-cicd-gate-flow.md`
|
||||
- `docs/flows/06-export-flow.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCS-CLISWEEP-001 | TODO | - | Docs Guild | Inventory all `stellaops` command references in `docs/**` and capture location, snippet, and context. |
|
||||
| 2 | DOCS-CLISWEEP-002 | TODO | DOCS-CLISWEEP-001 | Docs Guild | Classify each reference as replace, keep (legacy alias), or ambiguous; note rationale and owners. |
|
||||
| 3 | DOCS-CLISWEEP-003 | TODO | DOCS-CLISWEEP-002 | Docs Guild | Publish a sweep report under `docs/technical/reviews/cli-command-name-sweep-2026-01-14.md` with deterministic ordering. |
|
||||
| 4 | DOCS-CLISWEEP-004 | TODO | DOCS-CLISWEEP-003 | Docs Guild | Draft follow-up sprint tasks for replacements and exceptions (no edits performed in this sprint). |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: confirm whether `stellaops` is a supported legacy alias in any documentation or packaging context.
|
||||
- Risk: replacing command names in examples may diverge from shipped binaries if alias support exists; require CLI owner sign-off.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-16: CLI command naming alignment review with CLI guild.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint SPRINT_20260112_010_FE_ai_code_guard_console · AI Code Guard console UX
|
||||
|
||||
## Topic & Scope
|
||||
- Add UI surfaces for AI code guard status, evidence summaries, and waiver requests.
|
||||
- Provide inline badge states (Pass/Review/Block) and detail panels with line refs, similarity scores, and license verdicts.
|
||||
- Ensure offline-friendly rendering and deterministic UI outputs for evidence exports.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner guard endpoints and payloads from `SPRINT_20260112_010_SCANNER_ai_code_guard_core.md`.
|
||||
- Depends on Policy override semantics from `SPRINT_20260112_010_POLICY_ai_code_guard_policy.md`.
|
||||
- Can run in parallel with CLI and Integrations once API shapes are stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-AIGUARD-001 | TODO | SCANNER-AIGUARD-006 | Web Guild | Add AI code guard badge and summary panels for scan/PR views; include counts and status. |
|
||||
| 2 | FE-AIGUARD-002 | TODO | POLICY-AIGUARD-002 | Web Guild | Implement waiver request flow (issue link, expiry, approver role) with audit preview. |
|
||||
| 3 | FE-AIGUARD-003 | TODO | FE-AIGUARD-001 | Web Guild | Add detail panel with line refs, similarity evidence, and license verdicts; support export links. |
|
||||
| 4 | FE-AIGUARD-004 | TODO | FE-AIGUARD-003 | Web Guild | Add unit and e2e tests for AI code guard views and waiver flow. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide where AI code guard surfaces live in navigation (scan detail, PR view, or new Guard page).
|
||||
- Risk: waiver flows require Authority scope mapping; confirm roles before UI wiring.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-20: UX wireframe review with Docs and Security owners.
|
||||
@@ -0,0 +1,38 @@
|
||||
# Sprint 20260112-010-FE-binary-diff-explain-panel - Binary Diff Explain Panel
|
||||
|
||||
## Topic & Scope
|
||||
- Add a binary diff explain panel to the triage evidence UI and wire it to evidence bundle data.
|
||||
- Current state evidence: Evidence panel components and models do not include binary diff tab or fields (`src/Web/StellaOps.Web/src/app/features/triage/components/evidence-panel/index.ts`, `src/Web/StellaOps.Web/src/app/features/triage/models/evidence.model.ts`).
|
||||
- Evidence to produce: UI component, model updates, mock/test data updates, and UI guide update.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `SPRINT_20260112_009_SCANNER_binary_diff_bundle_export` for API payloads.
|
||||
- Parallel safe with evidence-card UI sprint if components remain isolated.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/vuln-explorer/README.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | BINDIFF-FE-001 | TODO | BINDIFF-SCAN-001 | UI Guild | Add binary diff fields to evidence models and API client. |
|
||||
| 2 | BINDIFF-FE-002 | TODO | BINDIFF-FE-001 | UI Guild | Implement binary diff explain component and wire into evidence panel tabs. |
|
||||
| 3 | BINDIFF-FE-003 | TODO | BINDIFF-FE-002 | QA Guild | Add component tests and update mock data for evidence panel. |
|
||||
| 4 | BINDIFF-FE-004 | TODO | BINDIFF-FE-002 | Docs Guild | Update `docs/UI_GUIDE.md` with binary diff explain panel usage. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Define UX affordances for large binary diffs (pagination, collapse, or download).
|
||||
- Ensure evidence panel handles missing binary diff data without errors.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,37 @@
|
||||
# Sprint SPRINT_20260112_010_INTEGRATIONS_ai_code_guard_annotations · AI Code Guard annotations
|
||||
|
||||
## Topic & Scope
|
||||
- Extend SCM annotation payloads to carry AI code guard status, counts, and evidence refs.
|
||||
- Add status checks and inline annotations for GitHub and GitLab integrations.
|
||||
- Ensure ASCII-only output and deterministic ordering in comments and checks.
|
||||
- **Working directory:** `src/Integrations`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner guard evidence from `SPRINT_20260112_010_SCANNER_ai_code_guard_core.md`.
|
||||
- Depends on base SCM annotation plumbing in `SPRINT_20260112_006_INTEGRATIONS_scm_annotations.md`.
|
||||
- Can run in parallel with CLI and UI sprints once payload contract is defined.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Integrations/AGENTS.md`
|
||||
- `docs/architecture/integrations.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | INTEGRATIONS-AIGUARD-001 | TODO | SCANNER-AIGUARD-006 | Integrations Guild | Define annotation payload fields for AI code guard (status, counts, evidence URIs, SARIF link). |
|
||||
| 2 | INTEGRATIONS-AIGUARD-002 | TODO | INTEGRATIONS-AIGUARD-001 | Integrations Guild | Implement GitHub and GitLab status checks and inline annotations for AI guard findings. |
|
||||
| 3 | INTEGRATIONS-AIGUARD-003 | TODO | INTEGRATIONS-AIGUARD-002 | Integrations Guild | Add deterministic tests for annotation mapping and error handling. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide if annotations should embed SARIF or link to an artifact; impacts SCM payload size limits.
|
||||
- Risk: SCM rate limits may require batching; align with existing annotation throttling rules.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-20: Annotation contract review with Scanner owners.
|
||||
@@ -0,0 +1,43 @@
|
||||
# Sprint SPRINT_20260112_010_POLICY_ai_code_guard_policy · AI Code Guard policy signals
|
||||
|
||||
## Topic & Scope
|
||||
- Add Policy DSL signals and helpers for AI code guard evidence (secrets, unsafe APIs, similarity, license verdicts, overrides).
|
||||
- Define policy matrix evaluation for allow/review/block outcomes and ensure deterministic explain traces.
|
||||
- Provide policy examples and tests that align with Scanner evidence outputs and Attestor predicates.
|
||||
- **Working directory:** `src/Policy`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner evidence model from `SPRINT_20260112_010_SCANNER_ai_code_guard_core.md`.
|
||||
- Docs updates tracked in `SPRINT_20260112_010_DOCS_ai_code_guard_docs.md`.
|
||||
- Can run in parallel with CLI and UI sprints after signal names stabilize.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Policy/AGENTS.md`
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/policy/guides/dsl.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | POLICY-AIGUARD-001 | TODO | SCANNER-AIGUARD-006 | Policy Guild | Add AI code guard signals to the Policy DSL signal context (guard status, counts, similarity, license verdicts, override metadata). |
|
||||
| 2 | POLICY-AIGUARD-002 | TODO | POLICY-AIGUARD-001 | Policy Guild | Implement matrix helpers for allow/review/block mapping and deterministic explain trace annotations. |
|
||||
| 3 | POLICY-AIGUARD-003 | TODO | POLICY-AIGUARD-001 | Policy Guild | Add policy pack examples and fixtures covering allow/review/block outcomes and override expiry. |
|
||||
| 4 | POLICY-AIGUARD-004 | TODO | POLICY-AIGUARD-002 | Policy Guild | Add deterministic unit and golden tests for AI code guard signal evaluation. |
|
||||
| 5 | POLICY-AIGUARD-005 | TODO | POLICY-AIGUARD-002 | Policy Guild | Wire guard evidence into policy explain exports so CLI and UI can surface reasons. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide how override roles map to existing Authority scopes and Policy exception flows; document in policy guide.
|
||||
- Risk: overlap with existing secret or license rules may double-count evidence; align signal naming to avoid collisions.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Signal naming review with Scanner owners.
|
||||
- 2026-01-23: Policy matrix review with Security and Docs owners.
|
||||
@@ -0,0 +1,47 @@
|
||||
# Sprint SPRINT_20260112_010_SCANNER_ai_code_guard_core · AI Code Guard core pipeline
|
||||
|
||||
## Topic & Scope
|
||||
- Implement the AI code guard pipeline in Scanner to evaluate changed hunks for secrets, unsafe API use, snippet similarity, and license diffs.
|
||||
- Produce deterministic evidence artifacts with hunk hashes, finding summaries, and rule versions for Policy and Attestor.
|
||||
- Package allowlist and denylist corpora for offline use; enforce stable ordering and deterministic thresholds.
|
||||
- Expose guard execution via Scanner WebService endpoints and SARIF-ready outputs for downstream CLI/SCM integrations.
|
||||
- **Working directory:** `src/Scanner`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Policy signals (`SPRINT_20260112_010_POLICY_ai_code_guard_policy.md`) and Attestor predicate registration (`SPRINT_20260112_010_ATTESTOR_ai_code_guard_predicate.md`).
|
||||
- Integrations annotation delivery depends on `SPRINT_20260112_006_INTEGRATIONS_scm_annotations.md`.
|
||||
- Can run in parallel with CLI and UI sprints once endpoint contracts are agreed.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Scanner/AGENTS.md`
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs-archived/product/advisories/14-Jan-2026 - Security gaps in AI-generated code.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SCANNER-AIGUARD-001 | TODO | - | Scanner Guild | Define AI code guard options (thresholds, license matrix, corpora paths) and validate config with deterministic defaults. |
|
||||
| 2 | SCANNER-AIGUARD-002 | TODO | SCANNER-AIGUARD-001 | Scanner Guild | Implement diff and hunk hashing pipeline to classify new vs pre-existing findings; emit stable hunk IDs. |
|
||||
| 3 | SCANNER-AIGUARD-003 | TODO | SCANNER-AIGUARD-001 | Scanner Guild | Implement unsafe API scan for changed hunks using existing capability scanners; produce file, line, and snippet evidence. |
|
||||
| 4 | SCANNER-AIGUARD-004 | TODO | SCANNER-AIGUARD-001 | Scanner Guild | Implement snippet similarity checker with allowlist and denylist corpora; enforce deterministic similarity scoring and threshold outputs. |
|
||||
| 5 | SCANNER-AIGUARD-005 | TODO | SCANNER-AIGUARD-001 | Scanner Guild | Implement license hygiene check using SBOM diff; map license evidence to allow/review/block verdicts. |
|
||||
| 6 | SCANNER-AIGUARD-006 | TODO | SCANNER-AIGUARD-002 | Scanner Guild | Emit AI code guard evidence payloads (JSON + DSSE-ready) and include SARIF output adapters for CLI/SCM. |
|
||||
| 7 | SCANNER-AIGUARD-007 | TODO | SCANNER-AIGUARD-006 | Scanner Guild | Add deterministic tests and fixtures for hunk hashing, similarity scoring, and license verdicts. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide on similarity algorithm (MinHash/SimHash/Jaccard) and corpus packaging format; lock before fixtures are published.
|
||||
- Risk: scanning source hunks may require language-specific normalizers; define normalization rules to keep hashes stable.
|
||||
- Risk: license matrix enforcement may conflict with existing Policy packs; align with Policy owners before enabling blocking defaults.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-18: Guard evidence model review with Policy and Attestor owners.
|
||||
- 2026-01-24: Similarity corpus packaging review with Offline Kit owners.
|
||||
@@ -0,0 +1,43 @@
|
||||
# Sprint 20260112-011-CLI-evidence-card-remediate-cli - Evidence Card and Remediation CLI
|
||||
|
||||
## Topic & Scope
|
||||
- Add CLI support for exporting and verifying the single-file evidence card so operators can fetch deterministic receipts without the UI.
|
||||
- Add CLI remediation action to request PR or ticket creation and print the returned link and metadata.
|
||||
- Current state evidence: evidence CLI only exports and verifies bundles (`src/Cli/StellaOps.Cli/Commands/EvidenceCommandGroup.cs`); `remediate` only returns guidance (`src/Cli/StellaOps.Cli/Commands/CommandFactory.cs`).
|
||||
- Evidence to produce: new CLI commands, JSON output schema, and tests for command parsing and output.
|
||||
- **Working directory:** `src/Cli/StellaOps.Cli`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on evidence card format and API (`docs/implplan/SPRINT_20260112_004_LB_evidence_card_core.md`, `docs/implplan/SPRINT_20260112_005_BE_evidence_card_api.md`).
|
||||
- Depends on remediation PR generator API (`docs/implplan/SPRINT_20260112_007_BE_remediation_pr_generator.md`).
|
||||
- Parallel safe with UI sprints; no shared DB migrations.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/advisory-ai/architecture.md`
|
||||
- `docs/modules/cli/guides/commands/evidence-bundle-format.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | EVPCARD-CLI-001 | TODO | SPRINT_20260112_005_BE_evidence_card_api.md | CLI Guild | Add `stella evidence card export` to fetch and write evidence-card files with deterministic naming and content type handling. |
|
||||
| 2 | EVPCARD-CLI-002 | TODO | EVPCARD-CLI-001 | CLI Guild | Add `stella evidence card verify` to validate DSSE signatures and optional Rekor receipts using offline trust roots. |
|
||||
| 3 | REMPR-CLI-001 | TODO | SPRINT_20260112_007_BE_remediation_pr_generator.md | CLI Guild | Add `stella remediate open-pr` to call the remediation PR endpoint with repo/branch options and emit PR URL, branch, and status. |
|
||||
| 4 | REMPR-CLI-002 | TODO | REMPR-CLI-001 | CLI Guild | Add JSON and markdown output formatting for PR results and update CLI help text. |
|
||||
| 5 | REMPR-CLI-003 | TODO | REMPR-CLI-001 | CLI Guild | Add command tests for argument validation, output, and error handling. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide CLI verb names and hierarchy to avoid collisions with existing `stella evidence export` and `stella remediate`.
|
||||
- Define required inputs for PR creation (integration id vs explicit repo URL) and how CLI resolves defaults.
|
||||
- Confirm offline verification behavior when Rekor receipts are absent or optional.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112_011_FE - Policy Unknowns Grey Queue UI Integration
|
||||
|
||||
## Topic & Scope
|
||||
- Point the Unknowns UI to the policy unknowns API so grey queue results are visible with fingerprints, triggers, and next actions.
|
||||
- Add UI affordances for manual adjudication and disputed evidence while keeping ordering deterministic.
|
||||
- Provide navigation from the Unknowns queue to determinization review context for grey queue items.
|
||||
- Owning directory: src/Web/StellaOps.Web; evidence includes API client updates, UI components, tests, and docs updates.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for API fields and unknowns schema updates.
|
||||
- CC 20260112_011 remains independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/api/unknowns-api.md`
|
||||
- `docs/modules/policy/determinization-api.md`
|
||||
- `docs/operations/unknowns-queue-runbook.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-UNK-005 | TODO | Policy API contract | Web Guild - Team | Add policy unknowns API client/models (fingerprint, triggers, next_actions, manual adjudication fields) and migrate the queue view to the policy endpoints. |
|
||||
| 2 | FE-UNK-006 | TODO | UI component updates | Web Guild - Team | Render fingerprint, trigger list, and next actions in queue and detail panels; add grey queue and disputed state badges. |
|
||||
| 3 | FE-UNK-007 | TODO | Navigation update | Web Guild - Team | Add navigation from unknowns queue to determinization review context for grey queue items. |
|
||||
| 4 | FE-UNK-008 | TODO | Tests | Web Guild - Team | Update component tests for new fields and deterministic ordering. |
|
||||
| 5 | FE-UNK-009 | TODO | Docs update | Web Guild - Team | Update UI guide or module docs with grey queue behavior and examples. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide whether to unify scanner unknowns and policy unknowns views or keep separate entry points.
|
||||
- Confirm UX for manual adjudication actions and the minimal detail panel fields.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: UI review with policy stakeholders.
|
||||
@@ -0,0 +1,42 @@
|
||||
# Sprint 20260112-012-FE-remediation-pr-ui-wiring - Remediation PR UI Wiring
|
||||
|
||||
## Topic & Scope
|
||||
- Extend the AI Remediate panel to open PRs or tickets and show results (PR URL, branch, status) alongside existing guidance.
|
||||
- Add UI gating and configuration for SCM connections and remediation PR enablement, linking to Integrations Hub when not configured.
|
||||
- Current state evidence: AI Remediate panel only exports guidance (`src/Web/StellaOps.Web/src/app/features/vex-hub/ai-remediate-panel.component.ts`); AI preferences include PR comments but no PR creation toggle (`src/Web/StellaOps.Web/src/app/features/settings/ai-preferences.component.ts`); Integrations wizard lists SCM providers without remediation wiring (`src/Web/StellaOps.Web/src/app/features/integrations/integration-wizard.component.ts`).
|
||||
- Evidence to produce: UI actions, API client models, settings wiring, and component tests.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on remediation PR backend API and models (`docs/implplan/SPRINT_20260112_007_BE_remediation_pr_generator.md`).
|
||||
- Depends on evidence card API for attachments (`docs/implplan/SPRINT_20260112_005_BE_evidence_card_api.md`).
|
||||
- Parallel safe with evidence-card UI and binary-diff UI sprints if components remain isolated.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/advisory-ai/architecture.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | REMPR-FE-001 | TODO | SPRINT_20260112_007_BE_remediation_pr_generator.md | UI Guild | Extend Advisory AI API client and models with PR creation request/response fields (PR URL, branch, status, evidence card id). |
|
||||
| 2 | REMPR-FE-002 | TODO | REMPR-FE-001 | UI Guild | Add "Open PR" action to AI Remediate panel with progress, success, and error states plus link/copy affordances. |
|
||||
| 3 | REMPR-FE-003 | TODO | REMPR-FE-001 | UI Guild | Add SCM connection selector and gating message with link to Integrations Hub when no SCM connection is available. |
|
||||
| 4 | REMPR-FE-004 | TODO | REMPR-FE-003 | UI Guild | Add settings toggles for remediation PR enablement and evidence-card attachment or PR comment behavior. |
|
||||
| 5 | REMPR-FE-005 | TODO | REMPR-FE-002 | UI Guild | Add component tests for PR actions and update `docs/UI_GUIDE.md` with remediation PR flow. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decide where PR status should surface outside the panel (triage row, evidence panel, or findings detail).
|
||||
- Ensure UI respects offline mode and hides PR actions when SCM is not configured or disabled.
|
||||
- Align evidence-card attachment behavior with backend defaults to avoid mismatched settings.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD (set once staffed).
|
||||
@@ -0,0 +1,41 @@
|
||||
# Sprint 20260112_012_POLICY - Determinization Reanalysis Configuration
|
||||
|
||||
## Topic & Scope
|
||||
- Introduce persisted determinization config for grey queue reanalysis triggers, conflict handling, and per-environment thresholds; remove hard-coded defaults in code.
|
||||
- Expose effective config via read endpoint and policy-admin write endpoint with audit trail.
|
||||
- Encode best-in-class defaults (EPSS delta >= 0.2, threshold crossing, Rekor/OpenVEX/telemetry/patch-proof/DSSE changes) and add tests for binding and determinism.
|
||||
- Owning directory: src/Policy; evidence includes options models, policy evaluation updates, tests, endpoints, and docs changes.
|
||||
- **Working directory:** `src/Policy`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_004_POLICY_unknowns_determinization_greyqueue.md` for unknowns outcome mapping and API output fields.
|
||||
- CC 20260112_012 remains independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Policy/AGENTS.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/policy/determinization-api.md`
|
||||
- `docs/api/unknowns-api.md`
|
||||
- `docs/operations/unknowns-queue-runbook.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | POLICY-CONFIG-001 | TODO | Config schema | Policy Guild - Team | Extend `DeterminizationOptions` with reanalysis triggers, conflict policy, and default values (EPSS delta >= 0.2, threshold crossing, Rekor/OpenVEX/telemetry/patch-proof/DSSE changes; tool-version trigger disabled by default). |
|
||||
| 2 | POLICY-CONFIG-002 | TODO | Storage + audit | Policy Guild - Team | Add per-tenant determinization config persistence with audit trail and validation for environment thresholds. |
|
||||
| 3 | POLICY-CONFIG-003 | TODO | Policy wiring | Policy Guild - Team | Replace hard-coded `DefaultEnvironmentThresholds` with effective config values in determinization evaluation. |
|
||||
| 4 | POLICY-CONFIG-004 | TODO | API exposure | Policy Guild - Team | Add read endpoint for effective config and policy-admin write endpoint for updates. |
|
||||
| 5 | POLICY-CONFIG-005 | TODO | Tests | Policy Guild - Team | Add tests for binding, validation, deterministic evaluation, and audit logging. |
|
||||
| 6 | POLICY-CONFIG-006 | TODO | Docs update | Policy Guild - Team | Update determinization and unknowns docs with configuration schema and defaults. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Defaults: EPSS delta >= 0.2, trigger on threshold crossings, Rekor entry new, OpenVEX status change, runtime telemetry exploit/reachability change, binary patch proof added, DSSE validation state change; tool-version trigger available but disabled by default.
|
||||
- Config exposure: read for policy viewers; write restricted to policy admin; audit trail required for all changes.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-16: Policy configuration review (Policy Guild, Platform).
|
||||
@@ -0,0 +1,39 @@
|
||||
# Sprint 20260112_013_FE - Determinization Config Pane
|
||||
|
||||
## Topic & Scope
|
||||
- Wire the Configuration Pane to determinization config endpoints so operators can view and edit grey queue settings from the UI.
|
||||
- Provide admin-gated editing of per-environment thresholds and reanalysis triggers with deterministic display and validation feedback.
|
||||
- Document the UI workflow and update component tests for the new configuration section.
|
||||
- Owning directory: src/Web/StellaOps.Web; evidence includes UI components, API wiring, tests, and docs updates.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_012_POLICY_determinization_reanalysis_config.md` for config read/write endpoints and defaults.
|
||||
- CC 20260112_013 remains independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Web/StellaOps.Web/AGENTS.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/policy/determinization-api.md`
|
||||
- `docs/api/policy.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-CONFIG-001 | TODO | Policy config API | Web Guild - Team | Add API client/models for determinization config (effective config read + admin update). |
|
||||
| 2 | FE-CONFIG-002 | TODO | UI section | Web Guild - Team | Add a Configuration Pane section for determinization thresholds and reanalysis triggers, with read-only view for non-admins. |
|
||||
| 3 | FE-CONFIG-003 | TODO | Validation feedback | Web Guild - Team | Surface server-side validation errors and show effective vs overridden values per environment. |
|
||||
| 4 | FE-CONFIG-004 | TODO | Tests | Web Guild - Team | Add component and service tests for config load/save and deterministic rendering. |
|
||||
| 5 | FE-CONFIG-005 | TODO | Docs update | Web Guild - Team | Update UI guide or module docs with configuration workflow and screenshots. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- UI write access must align with policy admin scope; read access follows policy viewer.
|
||||
- Ensure config pane changes do not conflict with offline-first deployment posture.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-21: UI and Policy config review.
|
||||
44
docs/implplan/SPRINT_20260112_013_FE_witness_ui_wiring.md
Normal file
44
docs/implplan/SPRINT_20260112_013_FE_witness_ui_wiring.md
Normal file
@@ -0,0 +1,44 @@
|
||||
# Sprint 20260112_013_FE · Witness UI Wiring
|
||||
|
||||
## Topic & Scope
|
||||
- Wire Console UI witness surfaces to real APIs (no mocks), including list, detail, verify, and export actions.
|
||||
- Surface path-witness nodeHash/pathHash and runtime evidence pointers in the witness modal and vulnerability explorer.
|
||||
- Add UI affordances for DSSE signature and Rekor verification status with offline-safe messaging.
|
||||
- **Working directory:** `src/Web/StellaOps.Web`. Evidence: updated API client, UI components, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner witness endpoints and payload fields from `SPRINT_20260112_004_SCANNER_path_witness_nodehash.md`.
|
||||
- Depends on predicate type alignment from `SPRINT_20260112_006_ATTESTOR_path_witness_predicate.md` and contracts from `SPRINT_20260112_008_DOCS_path_witness_contracts.md`.
|
||||
- UI download/export actions depend on backend endpoints for `/download` and `/export/sarif` (currently missing).
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/ARCHITECTURE_OVERVIEW.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/ui/README.md
|
||||
- docs/modules/ui/architecture.md
|
||||
- docs/modules/ui/implementation_plan.md
|
||||
- docs/contracts/witness-v1.md
|
||||
- docs/modules/vuln-explorer/architecture.md
|
||||
- docs/technical/cicd/sarif-integration.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | FE-WIT-001 | TODO | Scanner witness endpoints | Guild - UI | Replace `WitnessMockClient` usage with real `WitnessHttpClient` wiring; align base paths and query parameters with Scanner endpoints; add error handling and unit tests. |
|
||||
| 2 | FE-WIT-002 | TODO | PW-DOC-001 | Guild - UI | Extend `witness.models.ts` and view models to include `node_hashes`, `path_hash`, evidence URIs, and runtime evidence metadata; keep deterministic ordering in rendering and tests. |
|
||||
| 3 | FE-WIT-003 | TODO | FE-WIT-001, FE-WIT-002 | Guild - UI | Update witness modal and vulnerability explorer views to render node hash and path hash details, evidence links, and runtime join status; update component tests. |
|
||||
| 4 | FE-WIT-004 | TODO | Scanner verify endpoint | Guild - UI | Wire verify action to `/witnesses/{id}/verify`, display DSSE signature status and error details, and add unit tests. |
|
||||
| 5 | FE-WIT-005 | TODO | Backend download/export endpoints | Guild - UI | Add UI actions for witness JSON download and SARIF export; show disabled states until endpoints exist; add tests and help text. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- `docs/modules/ui/implementation_plan.md` is listed as required reading but is missing; restore or update the prerequisites before work starts.
|
||||
- Download/export UI depends on backend endpoints not yet present; coordinate with Scanner owners or defer FE-WIT-005.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: UI and API shape review with Scanner and Attestor owners.
|
||||
86
docs/implplan/SPRINT_20260112_014_CLI_config_viewer.md
Normal file
86
docs/implplan/SPRINT_20260112_014_CLI_config_viewer.md
Normal file
@@ -0,0 +1,86 @@
|
||||
# Sprint 20260112_014_CLI - Config Viewer (All Modules)
|
||||
|
||||
## Topic & Scope
|
||||
- Provide unified CLI config inspection across all StellaOps modules using `stella config <path> show` (example: `stella config policy.determinization show`).
|
||||
- Support `stella config list` to enumerate all supported config paths and aliases; output is deterministic and secrets are redacted.
|
||||
- Cover every config SectionName defined in code plus setup/integration config prefixes used by the setup wizard.
|
||||
- Owning directory: src/Cli/StellaOps.Cli; evidence includes command handlers, tests, and docs updates.
|
||||
- **Working directory:** `src/Cli`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on `docs/implplan/SPRINT_20260112_012_POLICY_determinization_reanalysis_config.md` for policy config read endpoints.
|
||||
- CC 20260112_014 remains independent aside from explicit dependencies.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `src/Cli/AGENTS.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/api/overview.md`
|
||||
- `docs/api/policy.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-CONFIG-010 | TODO | Config catalog | Build a config catalog from SectionName constants and setup prefixes; define canonical CLI paths and aliases (case-insensitive, `:` and `.` interchangeable). |
|
||||
| 2 | CLI-CONFIG-011 | TODO | Command surface | Add `stella config list` and `stella config <path> show` (example: `stella config policy.determinization show`). |
|
||||
| 3 | CLI-CONFIG-012 | TODO | Data sources | Implement config readers for effective config (policy endpoint where available; local config file fallback). |
|
||||
| 4 | CLI-CONFIG-013 | TODO | Output and redaction | Deterministic table/json output with stable ordering and redaction of secret keys. |
|
||||
| 5 | CLI-CONFIG-014 | TODO | Tests | Add CLI tests for list/show behavior, alias matching, and deterministic output. |
|
||||
| 6 | CLI-CONFIG-015 | TODO | Docs update | Update CLI reference docs with config list/show usage and examples. |
|
||||
|
||||
## Config Inventory (SectionName keys by module)
|
||||
- __Libraries: Eventing, HybridLogicalClock, IssuerDirectory:Client, LazyFetchHttp, Provcache
|
||||
- AdvisoryAI: AdvisoryAI:Chat, AdvisoryAI:Inference:Offline, AdvisoryAI:LlmProviders, AdvisoryAI:RateLimits
|
||||
- AirGap: AirGap:BundleSigning, AirGap:Quarantine
|
||||
- Attestor: Attestor:BinaryDiff, Attestor:GraphRoot, Attestor:Rekor
|
||||
- BinaryIndex: BinaryIndex:Builders, BinaryIndex:FunctionExtraction, BinaryIndex:GoldenSet, BSim, Disassembly, Ghidra, Ghidriff, HybridDisassembly, Resolution, ResolutionCache, VexBridge
|
||||
- Concelier: Concelier:Cache, Concelier:Epss, Concelier:Interest, Federation
|
||||
- Doctor: Doctor
|
||||
- EvidenceLocker: EvidenceLocker
|
||||
- Excititor: AutoVex:Downgrade, Excititor:Airgap, Excititor:Evidence:Linking, Excititor:Mirror, VexSignatureVerification
|
||||
- ExportCenter: ExportCenter, ExportCenter:Adapters:Trivy, ExportCenter:Distribution:Oci, ExportCenter:Encryption, Provcache:Oci
|
||||
- Findings: findings:ledger, findings:ledger:airgap, findings:ledger:incident, Scoring
|
||||
- Gateway: Gateway
|
||||
- IssuerDirectory: IssuerDirectory
|
||||
- Notifier: ChannelAdapters, InAppChannel, Notifier:AckBridge, Notifier:Correlation, Notifier:Digest, Notifier:DigestSchedule, Notifier:DigestScheduler, Notifier:Fallback, Notifier:IncidentManager, Notifier:Integrations:OpsGenie, Notifier:Integrations:PagerDuty, Notifier:Localization, Notifier:Observability:Chaos, Notifier:Observability:DeadLetter, Notifier:Observability:Metrics, Notifier:Observability:Retention, Notifier:Observability:Tracing, Notifier:OperatorOverride, Notifier:QuietHours, Notifier:Security:HtmlSanitizer, Notifier:Security:Signing, Notifier:Security:TenantIsolation, Notifier:Security:Webhook, Notifier:Simulation, Notifier:StormBreaker, Notifier:SuppressionAudit, Notifier:Tenancy:Channels, Notifier:Tenancy:Enrichment, Notifier:Tenancy:Middleware, Notifier:Tenancy:Rls, Notifier:Tenant, Notifier:Throttler, TemplateRenderer
|
||||
- Notify: notify
|
||||
- Orchestrator: FirstSignal, Orchestrator, Orchestrator:IncidentMode, Orchestrator:Stream
|
||||
- Platform: Platform
|
||||
- Plugin: PluginRegistry, Plugins
|
||||
- Policy: ConfidenceWeights, Determinization, Policy:ExceptionApproval, Policy:Exceptions:Approval, Policy:Exceptions:Expiry, Policy:GateBypassAudit, PolicyDecisionAttestation, PolicyEngine, PolicyEngine:EvidenceWeightedScore, PolicyEngine:Tenancy, PolicyGates, PolicyGateway, RateLimiting, ReachabilitySignals, SmartDiff:Gates, ToolLattice, UnknownBudgets, VexSigning
|
||||
- Registry: RegistryTokenService
|
||||
- Replay: Replay
|
||||
- Router: Gateway, GatewayNode, Router:Authority, Router:Health, Router:Node, Router:OpenApi, Router:Routing
|
||||
- SbomService: RegistryHttp, RegistrySources, ScannerHttp
|
||||
- Scanner: DriftAttestation, Epss, Epss:Enrichment, Epss:Ingest, Epss:Signal, scanner, Scanner:Analyzers:EntryTrace, Scanner:Analyzers:Native, Scanner:Analyzers:Secrets, scanner:concelier, Scanner:EntryTrace:Semantic, Scanner:EpssEnrichment, Scanner:FuncProof:Dsse, Scanner:FuncProof:Generation, Scanner:FuncProof:Oci, Scanner:FuncProof:Transparency, Scanner:Idempotency, Scanner:OfflineKit, scanner:proofSpine:dsse, Scanner:Reachability:PrGate, Scanner:ReachabilitySubgraph, Scanner:ReachabilityWitness, Scanner:Worker, Scanner:Worker:NativeAnalyzers, ValidationGate, VexGate
|
||||
- Scheduler: Scheduler:HlcOrdering
|
||||
- Signals: EvidenceNormalization, EvidenceWeightedScore, Signals, Signals:Retention, Signals:UnknownsDecay, Signals:UnknownsRescan, Signals:UnknownsScoring
|
||||
- Signer: Signer:Keyless, Sigstore
|
||||
- TaskRunner: TaskRunner:ApiDeprecation, TaskRunner:Client
|
||||
- Telemetry: Telemetry:Incident, Telemetry:Sealed
|
||||
- VexHub: VexHub
|
||||
- VexLens: VexLens, VexLens:NoiseGate
|
||||
- Zastava: zastava:agent, zastava:observer, zastava:runtime, zastava:webhook
|
||||
|
||||
## Setup/Integration Config Prefixes (from CLI setup wizard)
|
||||
- authority.* (plus Authority:Plugins.* and Authority:PasswordPolicy.*)
|
||||
- cache.*
|
||||
- database.*
|
||||
- llm.* (plus AdvisoryAI:Enabled and AdvisoryAI:LlmProviders.*)
|
||||
- notify.* (plus Notify:Channels.* and Notify:Rules.*)
|
||||
- registry.*
|
||||
- settingsstore.*
|
||||
- telemetry.*
|
||||
- users.*
|
||||
- vault.*
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; expanded to cover all config sections and CLI path aliases. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Canonical path normalization: lower-case, `:` and `.` treated as separators, module prefix added when SectionName has no prefix (example: `policy.determinization`).
|
||||
- Data source precedence: explicit `--config` file path, then service endpoints where available.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-20: CLI + Policy endpoint alignment review.
|
||||
43
docs/implplan/SPRINT_20260112_014_CLI_witness_commands.md
Normal file
43
docs/implplan/SPRINT_20260112_014_CLI_witness_commands.md
Normal file
@@ -0,0 +1,43 @@
|
||||
# Sprint 20260112_014_CLI · Witness Commands
|
||||
|
||||
## Topic & Scope
|
||||
- Replace placeholder witness CLI handlers with real API-backed implementations for list, show, verify, and export.
|
||||
- Enforce ASCII-only output and deterministic ordering for witness results.
|
||||
- Provide offline-friendly verification options where possible.
|
||||
- **Working directory:** `src/Cli/StellaOps.Cli`. Evidence: updated handlers, backend client, and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Scanner witness endpoints and payload fields from `SPRINT_20260112_004_SCANNER_path_witness_nodehash.md`.
|
||||
- Depends on predicate type alignment from `SPRINT_20260112_006_ATTESTOR_path_witness_predicate.md`.
|
||||
- Export/download commands depend on backend endpoints for witness JSON download and SARIF export.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/ARCHITECTURE_OVERVIEW.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/cli/README.md
|
||||
- docs/modules/cli/architecture.md
|
||||
- docs/modules/cli/implementation_plan.md
|
||||
- docs/contracts/witness-v1.md
|
||||
- docs/technical/cicd/sarif-integration.md
|
||||
- docs/operations/proof-verification-runbook.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-WIT-001 | TODO | Scanner endpoints | Guild - CLI | Implement witness API calls in `IBackendOperationsClient` and `BackendOperationsClient` for list/get/verify; add unit tests. |
|
||||
| 2 | CLI-WIT-002 | TODO | CLI-WIT-001 | Guild - CLI | Replace placeholders in `CommandHandlers.Witness.cs` with real API calls; enforce ASCII-only output and deterministic ordering; update CLI tests. |
|
||||
| 3 | CLI-WIT-003 | TODO | Backend export endpoints | Guild - CLI | Implement `witness export` to download JSON/SARIF when endpoints are available; add safe fallback messaging and tests. |
|
||||
| 4 | CLI-WIT-004 | TODO | CLI-WIT-001 | Guild - CLI | Implement `witness verify` to call `/witnesses/{id}/verify` and report DSSE status; add tests for error paths and offline mode behavior. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Added `docs/modules/cli/implementation_plan.md` to satisfy CLI charter prerequisites. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Export/download depends on backend endpoints that do not yet exist; coordinate with Scanner owners or defer CLI-WIT-003.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: CLI and API shape review with Scanner and Attestor owners.
|
||||
@@ -0,0 +1,40 @@
|
||||
# Sprint 20260112_015_SIGNER · Path Witness Predicate Registry
|
||||
|
||||
## Topic & Scope
|
||||
- Register canonical path-witness predicate type `https://stella.ops/predicates/path-witness/v1` in Signer allowlists.
|
||||
- Add alias support for `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1` without breaking existing workflows.
|
||||
- Extend Signer predicate classification helpers and tests for the new predicate types.
|
||||
- **Working directory:** `src/Signer/StellaOps.Signer`. Evidence: updated predicate registry and tests.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Predicate type locked to `https://stella.ops/predicates/path-witness/v1` with aliases `stella.ops/pathWitness@v1` and `https://stella.ops/pathWitness/v1`.
|
||||
- Parallel execution is safe with Attestor and Scanner once predicate naming is stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- docs/README.md
|
||||
- docs/ARCHITECTURE_OVERVIEW.md
|
||||
- docs/modules/platform/architecture-overview.md
|
||||
- docs/modules/signer/README.md
|
||||
- docs/modules/signer/architecture.md
|
||||
- docs/modules/signer/implementation_plan.md
|
||||
- docs/contracts/witness-v1.md
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | SIGNER-PW-001 | TODO | Predicate type locked | Guild - Signer | Add predicate constants for canonical and alias URIs in `PredicateTypes.cs`; update `GetAllowedPredicateTypes`, `IsReachabilityRelatedType`, and `IsAllowedPredicateType`. |
|
||||
| 2 | SIGNER-PW-002 | TODO | SIGNER-PW-001 | Guild - Signer | Add or update Signer tests to validate allowed predicate lists and reachability classification for the new predicate types. |
|
||||
| 3 | SIGNER-PW-003 | TODO | SIGNER-PW-001 | Guild - Signer | Update `PredicateTypes.IsStellaOpsType` and `SignerStatementBuilder.GetRecommendedStatementType` to recognize `https://stella.ops/` and `https://stella-ops.org/` URIs as StellaOps types; add Keyless signer tests for Statement v1 selection. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-14 | Sprint created; awaiting staffing. | Planning |
|
||||
| 2026-01-14 | Added `docs/modules/signer/implementation_plan.md` to satisfy Signer charter prerequisites. | Planning |
|
||||
| 2026-01-14 | Added task to ensure Statement type selection treats `https://stella.ops/` predicate URIs as StellaOps types. | Planning |
|
||||
|
||||
## Decisions & Risks
|
||||
- Predicate allowlist changes can affect downstream verification policies; coordinate with Attestor and Policy owners.
|
||||
|
||||
## Next Checkpoints
|
||||
- TBD: Signer predicate registry review with Attestor owners.
|
||||
@@ -1,350 +0,0 @@
|
||||
# Sprint 20260113_000 - Master Index - OCI Binary Integrity
|
||||
|
||||
## Topic & Scope
|
||||
- Coordinate four sprint batches implementing OCI layer-level image integrity verification with binary patch detection and evidence linking.
|
||||
- Align Scanner, Attestor, Excititor, CLI, and Tools deliverables for DSSE attestations, VEX links, and validation corpus coverage.
|
||||
- Provide a 25-30 point, 13-sprint plan with dependencies, metrics, and datasets for evidence-first security.
|
||||
- **Working directory:** `docs/implplan`.
|
||||
|
||||
### Executive Summary
|
||||
This master index coordinates four sprint batches implementing **OCI layer-level image integrity verification** with binary patch detection capabilities. The complete feature set enables:
|
||||
|
||||
1. **Multi-arch image inspection** with layer enumeration
|
||||
2. **Section-level binary analysis** (ELF/PE) for vendor backport detection
|
||||
3. **DSSE-signed attestations** proving patch presence or absence
|
||||
4. **VEX auto-linking** to binary evidence for deterministic decisions
|
||||
5. **Golden pairs dataset** for validation and regression testing
|
||||
|
||||
**Total Effort:** ~25-30 story points across 4 batches, 13 sprints
|
||||
**Priority:** High (core differentiator for evidence-first security)
|
||||
|
||||
### Background
|
||||
#### Advisory Origin
|
||||
The original product advisory specified requirements for:
|
||||
|
||||
> OCI layer-level image integrity verification that:
|
||||
> - Enumerates all layers across multi-arch manifests
|
||||
> - Computes section-level hashes (ELF .text/.rodata, PE .text/.rdata)
|
||||
> - Produces DSSE-signed in-toto attestations for binary diffs
|
||||
> - Maps findings to VEX with cryptographic evidence links
|
||||
> - Validates against a curated "golden pairs" corpus
|
||||
|
||||
#### Strategic Value
|
||||
|
||||
| Capability | Business Value |
|
||||
|------------|----------------|
|
||||
| Binary patch detection | Prove vendor backports without source access |
|
||||
| Attestation chain | Tamper-evident evidence for audits |
|
||||
| VEX evidence links | Deterministic, reproducible security decisions |
|
||||
| Golden pairs validation | Confidence in detection accuracy |
|
||||
|
||||
### Sprint Batch Index
|
||||
|
||||
| Batch | ID | Topic | Sprints | Status | Priority |
|
||||
|-------|-----|-------|---------|--------|----------|
|
||||
| 1 | 20260113_001 | ELF Section Hashes and Binary Diff Attestation | 4 | DOING | P0 |
|
||||
| 2 | 20260113_002 | Image Index Resolution CLI | 3 | DONE | P1 |
|
||||
| 3 | 20260113_003 | VEX Evidence Auto-Linking | 2 | DONE | P1 |
|
||||
| 4 | 20260113_004 | Golden Pairs Pilot (Vendor Backport Corpus) | 3 | BLOCKED | P2 |
|
||||
|
||||
### Batch Details
|
||||
|
||||
#### Batch 001: ELF Section Hashes and Binary Diff Attestation
|
||||
**Index:** [SPRINT_20260113_001_000_INDEX_binary_diff_attestation.md](SPRINT_20260113_001_000_INDEX_binary_diff_attestation.md)
|
||||
|
||||
**Scope:** Core binary analysis infrastructure
|
||||
|
||||
| Sprint | ID | Module | Topic | Key Deliverables |
|
||||
|--------|-----|--------|-------|------------------|
|
||||
| 1 | 001_001 | SCANNER | ELF Section Hash Extractor | `IElfSectionHashExtractor`, per-section SHA-256 |
|
||||
| 2 | 001_002 | ATTESTOR | BinaryDiffV1 In-Toto Predicate | `BinaryDiffV1` schema, DSSE signing |
|
||||
| 3 | 001_003 | CLI | Binary Diff Command | `stella binary diff`, OCI layer comparison |
|
||||
| 4 | 001_004 | DOCS | Binary Diff Attestation Documentation | Architecture docs, examples |
|
||||
|
||||
**Key Models:**
|
||||
- `ElfSectionHash` - Per-section hash with flags
|
||||
- `BinaryDiffV1` - In-toto predicate for diff attestations
|
||||
- `SectionDelta` - Section comparison result
|
||||
|
||||
#### Batch 002: Image Index Resolution CLI
|
||||
**Index:** [SPRINT_20260113_002_000_INDEX_image_index_resolution.md](SPRINT_20260113_002_000_INDEX_image_index_resolution.md)
|
||||
|
||||
**Scope:** Multi-arch image inspection and layer enumeration
|
||||
|
||||
| Sprint | ID | Module | Topic | Key Deliverables |
|
||||
|--------|-----|--------|-------|------------------|
|
||||
| 1 | 002_001 | SCANNER | OCI Image Inspector Service | `IOciImageInspector`, manifest resolution |
|
||||
| 2 | 002_002 | CLI | Image Inspect Command | `stella image inspect`, platform selection |
|
||||
| 3 | 002_003 | DOCS | Image Inspection Documentation | Architecture docs, examples |
|
||||
|
||||
**Key Models:**
|
||||
- `ImageInspectionResult` - Full image analysis
|
||||
- `PlatformManifest` - Per-platform manifest info
|
||||
- `LayerInfo` - Layer digest, size, media type
|
||||
|
||||
#### Batch 003: VEX Evidence Auto-Linking
|
||||
**Index:** [SPRINT_20260113_003_000_INDEX_vex_evidence_linking.md](SPRINT_20260113_003_000_INDEX_vex_evidence_linking.md)
|
||||
|
||||
**Scope:** Automatic linking of VEX entries to binary diff evidence
|
||||
|
||||
| Sprint | ID | Module | Topic | Key Deliverables |
|
||||
|--------|-----|--------|-------|------------------|
|
||||
| 1 | 003_001 | EXCITITOR | VEX Evidence Linker | `IVexEvidenceLinker`, CycloneDX mapping |
|
||||
| 2 | 003_002 | CLI | VEX Evidence Integration | `--link-evidence` flag, evidence display |
|
||||
|
||||
**Key Models:**
|
||||
- `VexEvidenceLink` - Link to evidence attestation
|
||||
- `VexEvidenceLinkSet` - Multi-evidence aggregation
|
||||
|
||||
#### Batch 004: Golden Pairs Pilot
|
||||
**Index:** [SPRINT_20260113_004_000_INDEX_golden_pairs_pilot.md](SPRINT_20260113_004_000_INDEX_golden_pairs_pilot.md)
|
||||
|
||||
**Scope:** Validation dataset for binary patch detection
|
||||
|
||||
| Sprint | ID | Module | Topic | Key Deliverables |
|
||||
|--------|-----|--------|-------|------------------|
|
||||
| 1 | 004_001 | TOOLS | Golden Pairs Data Model | `GoldenPairMetadata`, JSON schema |
|
||||
| 2 | 004_002 | TOOLS | Mirror and Diff Pipeline | Package mirror, diff validation |
|
||||
| 3 | 004_003 | TOOLS | Pilot CVE Corpus (3 CVEs) | Dirty Pipe, Baron Samedit, PrintNightmare |
|
||||
|
||||
**Target CVEs:**
|
||||
- CVE-2022-0847 (Dirty Pipe) - Linux kernel
|
||||
- CVE-2021-3156 (Baron Samedit) - sudo
|
||||
- CVE-2021-34527 (PrintNightmare) - Windows PE (conditional)
|
||||
|
||||
### Cross-Cutting Concerns
|
||||
|
||||
#### Determinism Requirements
|
||||
All components must follow CLAUDE.md Section 8 determinism rules:
|
||||
|
||||
| Requirement | Implementation |
|
||||
|-------------|----------------|
|
||||
| Timestamps | Inject `TimeProvider`, use UTC ISO-8601 |
|
||||
| IDs | Inject `IGuidGenerator` or derive from content |
|
||||
| Ordering | Sort sections by name, layers by index |
|
||||
| JSON | RFC 8785 canonical encoding for hashing |
|
||||
| Hashes | SHA-256 lowercase hex, no prefix |
|
||||
|
||||
#### DSSE and In-Toto Standards
|
||||
|
||||
| Standard | Version | Usage |
|
||||
|----------|---------|-------|
|
||||
| DSSE | v1 | Envelope format for all attestations |
|
||||
| In-Toto | v1.0 | Predicate wrapper (`_type`, `subject`, `predicateType`) |
|
||||
| BinaryDiffV1 | 1.0.0 | Custom predicate for binary diff attestations |
|
||||
| Rekor | v1 | Optional transparency log integration |
|
||||
|
||||
#### Test Requirements
|
||||
|
||||
| Category | Coverage |
|
||||
|----------|----------|
|
||||
| Unit | All public APIs, serialization round-trips |
|
||||
| Integration | End-to-end with test containers |
|
||||
| Determinism | Identical inputs produce identical outputs |
|
||||
| Golden | Validation against known-good corpus |
|
||||
|
||||
### File Manifest
|
||||
|
||||
#### Sprint Files
|
||||
|
||||
```
|
||||
docs/implplan/
|
||||
+-- SPRINT_20260113_000_MASTER_INDEX_oci_binary_integrity.md # This file
|
||||
|
|
||||
+-- Batch 001: Binary Diff Attestation
|
||||
| +-- SPRINT_20260113_001_000_INDEX_binary_diff_attestation.md
|
||||
| +-- SPRINT_20260113_001_001_SCANNER_elf_section_hashes.md
|
||||
| +-- SPRINT_20260113_001_002_ATTESTOR_binary_diff_predicate.md
|
||||
| +-- SPRINT_20260113_001_003_CLI_binary_diff_command.md
|
||||
| +-- SPRINT_20260113_001_004_DOCS_binary_diff_attestation.md
|
||||
|
|
||||
+-- Batch 002: Image Index Resolution
|
||||
| +-- SPRINT_20260113_002_000_INDEX_image_index_resolution.md
|
||||
| +-- SPRINT_20260113_002_001_SCANNER_image_inspector_service.md
|
||||
| +-- SPRINT_20260113_002_002_CLI_image_inspect_command.md
|
||||
| +-- SPRINT_20260113_002_003_DOCS_image_inspection.md
|
||||
|
|
||||
+-- Batch 003: VEX Evidence Linking
|
||||
| +-- SPRINT_20260113_003_000_INDEX_vex_evidence_linking.md
|
||||
| +-- SPRINT_20260113_003_001_EXCITITOR_vex_evidence_linker.md
|
||||
| +-- SPRINT_20260113_003_002_CLI_vex_evidence_integration.md
|
||||
|
|
||||
+-- Batch 004: Golden Pairs Pilot
|
||||
+-- SPRINT_20260113_004_000_INDEX_golden_pairs_pilot.md
|
||||
+-- SPRINT_20260113_004_001_TOOLS_golden_pairs_data_model.md
|
||||
+-- SPRINT_20260113_004_002_TOOLS_mirror_diff_pipeline.md
|
||||
+-- SPRINT_20260113_004_003_TOOLS_pilot_corpus.md
|
||||
```
|
||||
|
||||
#### Schema Files
|
||||
|
||||
```
|
||||
docs/schemas/
|
||||
+-- binarydiff-v1.schema.json # Binary diff attestation (Batch 001)
|
||||
+-- golden-pair-v1.schema.json # Golden pair metadata (Batch 004)
|
||||
+-- golden-pairs-index.schema.json # Corpus index (Batch 004)
|
||||
```
|
||||
|
||||
#### Source Directories
|
||||
|
||||
```
|
||||
src/
|
||||
+-- Scanner/
|
||||
| +-- __Libraries/
|
||||
| +-- StellaOps.Scanner.Analyzers.Native/
|
||||
| +-- Sections/ # ELF/PE section hash extraction
|
||||
+-- Attestor/
|
||||
| +-- StellaOps.Attestor.Core/
|
||||
| +-- Predicates/
|
||||
| +-- BinaryDiffV1.cs # Binary diff predicate
|
||||
+-- Excititor/
|
||||
| +-- __Libraries/
|
||||
| +-- StellaOps.Excititor.Core/
|
||||
| +-- Evidence/ # VEX evidence linking
|
||||
+-- Cli/
|
||||
| +-- StellaOps.Cli/
|
||||
| +-- Commands/
|
||||
| +-- BinaryDiffCommandGroup.cs
|
||||
| +-- ImageInspectCommandGroup.cs
|
||||
+-- Tools/
|
||||
+-- GoldenPairs/
|
||||
+-- StellaOps.Tools.GoldenPairs/
|
||||
|
||||
datasets/
|
||||
+-- golden-pairs/
|
||||
+-- index.json
|
||||
+-- README.md
|
||||
+-- CVE-2022-0847/
|
||||
+-- CVE-2021-3156/
|
||||
```
|
||||
|
||||
### Success Metrics
|
||||
|
||||
#### Functional Metrics
|
||||
|
||||
| Metric | Target |
|
||||
|--------|--------|
|
||||
| ELF section hash accuracy | 100% match with reference implementation |
|
||||
| Binary diff verdict accuracy | >= 95% on golden pairs corpus |
|
||||
| Attestation verification | 100% pass Rekor/in-toto validation |
|
||||
| VEX evidence link coverage | >= 90% of applicable entries |
|
||||
|
||||
#### Performance Metrics
|
||||
|
||||
| Metric | Target |
|
||||
|--------|--------|
|
||||
| Section hash extraction | < 100ms per binary |
|
||||
| Binary diff comparison | < 500ms per pair |
|
||||
| Image index resolution | < 2s for multi-arch images |
|
||||
|
||||
### Risk Register
|
||||
|
||||
| Risk | Likelihood | Impact | Mitigation |
|
||||
|------|------------|--------|------------|
|
||||
| PE section hashing complexity | Medium | Medium | Defer PrintNightmare if PE not ready |
|
||||
| Large kernel binaries | Medium | Low | Extract specific .ko modules |
|
||||
| Package archive availability | Medium | High | Cache packages locally |
|
||||
| Cross-platform DSSE signing | Low | Medium | Use portable signing libraries |
|
||||
|
||||
### Execution Schedule
|
||||
|
||||
#### Recommended Order
|
||||
|
||||
1. **Week 1-2:** Batch 001 Sprints 1-2 (ELF hashes, predicate)
|
||||
2. **Week 2-3:** Batch 002 Sprint 1 (image inspector) + Batch 004 Sprint 1 (data model)
|
||||
3. **Week 3-4:** Batch 001 Sprint 3 (CLI) + Batch 002 Sprint 2 (CLI)
|
||||
4. **Week 4-5:** Batch 003 (VEX linking) + Batch 004 Sprint 2 (pipeline)
|
||||
5. **Week 5-6:** Documentation sprints + Batch 004 Sprint 3 (corpus)
|
||||
|
||||
#### Parallelization Opportunities
|
||||
|
||||
- Batch 004 Sprint 1 can start immediately (no dependencies)
|
||||
- Documentation sprints can run in parallel with implementation
|
||||
- Batch 002 Sprint 1 can start after Batch 001 Sprint 1
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Batch dependencies are captured in the batch index files; Batch 001 Sprint 001 is the earliest gating sprint.
|
||||
- Batch 004 can start in parallel with Batch 001; documentation sprints can run in parallel with implementation work.
|
||||
- Other 20260113_000 planning documents are index-only, so parallel edits remain safe.
|
||||
|
||||
```
|
||||
+-----------------------------------------------------------------------------------+
|
||||
| DEPENDENCY FLOW |
|
||||
+-----------------------------------------------------------------------------------+
|
||||
| |
|
||||
| BATCH 001: Binary Diff Attestation |
|
||||
| +------------------------------------------------------------------+ |
|
||||
| | Sprint 001 (ELF Hashes) -> Sprint 002 (Predicate) -> Sprint 003 (CLI) |
|
||||
| +------------------------------------------------------------------+ |
|
||||
| | | |
|
||||
| v v |
|
||||
| BATCH 002: Image Index Resolution | |
|
||||
| +--------------------------------+ | |
|
||||
| | Sprint 001 -> Sprint 002 (CLI) | | |
|
||||
| +--------------------------------+ | |
|
||||
| | | |
|
||||
| v v |
|
||||
| BATCH 003: VEX Evidence Linking <------+ |
|
||||
| +--------------------------------+ |
|
||||
| | Sprint 001 (Linker) -> Sprint 002 (CLI) |
|
||||
| +--------------------------------+ |
|
||||
| |
|
||||
| BATCH 004: Golden Pairs (Validation) - Can start in parallel with Batch 001 |
|
||||
| +------------------------------------------------------------------+ |
|
||||
| | Sprint 001 (Model) -> Sprint 002 (Pipeline) -> Sprint 003 (Corpus) |
|
||||
| +------------------------------------------------------------------+ |
|
||||
| | |
|
||||
| v |
|
||||
| Uses Batch 001 Sprint 001 (ELF Hashes) for validation |
|
||||
| |
|
||||
+-----------------------------------------------------------------------------------+
|
||||
```
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/modules/scanner/architecture.md`
|
||||
- `docs/modules/attestor/architecture.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/excititor/architecture.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | INDEX-20260113-000-01 | DONE | None | Project Mgmt | Normalize master index to standard sprint template and ASCII-only formatting. |
|
||||
| 2 | INDEX-20260113-000-02 | DONE | None | Project Mgmt | Verify batch index links and file manifest entries remain consistent. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Master index created from product advisory analysis. | Project Mgmt |
|
||||
| 2026-01-13 | Batch 001 INDEX already existed; added to master index. | Project Mgmt |
|
||||
| 2026-01-13 | Batches 002, 003, 004 sprint files created. | Project Mgmt |
|
||||
| 2026-01-13 | Normalized sprint file to standard template; ASCII-only cleanup; no semantic changes. | Project Mgmt |
|
||||
| 2026-01-13 | Batch 001 CLI and Docs sprints completed; remaining batch work in progress. | CLI + Docs |
|
||||
| 2026-01-13 | Batch 002 sprints completed (image inspection service, CLI, docs). | Scanner + CLI + Docs |
|
||||
| 2026-01-13 | Batch 003 completed; Batch 004 data model and pipeline done; pilot corpus blocked. | Excititor + CLI + Tools |
|
||||
|
||||
## Decisions & Risks
|
||||
- **APPROVED 2026-01-13**: Four-batch structure covering full advisory scope.
|
||||
- **APPROVED 2026-01-13**: ELF-first approach; PE support conditional on Batch 001 progress.
|
||||
- **APPROVED 2026-01-13**: Golden pairs stored in datasets/, not git LFS initially.
|
||||
- **APPROVED 2026-01-13**: VEX evidence linking extends existing Excititor module.
|
||||
- **RISK**: PrintNightmare (PE) may be deferred if PE section hashing not ready.
|
||||
- **RISK**: Kernel binaries are large; may need to extract specific modules.
|
||||
|
||||
## Next Checkpoints
|
||||
- Batch 001 complete -> Core binary diff infrastructure operational
|
||||
- Batch 002 complete -> Multi-arch image inspection available
|
||||
- Batch 003 complete -> VEX entries include evidence links
|
||||
- Batch 004 complete -> Validation corpus ready for CI integration
|
||||
- All batches complete -> Full OCI layer-level integrity verification operational
|
||||
|
||||
## References
|
||||
- [OCI Image Index Specification](https://github.com/opencontainers/image-spec/blob/main/image-index.md)
|
||||
- [DSSE Specification](https://github.com/secure-systems-lab/dsse)
|
||||
- [In-Toto Attestation Framework](https://github.com/in-toto/attestation)
|
||||
- [CycloneDX VEX](https://cyclonedx.org/capabilities/vex/)
|
||||
- [ELF Specification](https://refspecs.linuxfoundation.org/elf/elf.pdf)
|
||||
- [PE Format](https://docs.microsoft.com/en-us/windows/win32/debug/pe-format)
|
||||
@@ -1,264 +0,0 @@
|
||||
# Sprint 20260113_004_000 - Index - Golden Pairs Pilot
|
||||
|
||||
## Topic & Scope
|
||||
- Build the curated golden pairs dataset infrastructure to validate binary diff accuracy against real backports.
|
||||
- Define data models, mirroring pipeline, and a three-CVE pilot corpus for regression testing.
|
||||
- Align Tools implementation with the Scanner binary diff features for deterministic validation.
|
||||
- **Working directory:** `docs/implplan`.
|
||||
|
||||
### Executive Summary
|
||||
This sprint batch implements a **curated dataset infrastructure** for binary patch verification. "Golden pairs" are matched sets of stock (upstream) vs vendor-patched binaries tied to specific CVEs, enabling validation of the binary diff system's ability to detect vendor backports.
|
||||
|
||||
**Scope:** Pilot corpus with 3 CVEs (Dirty Pipe, sudo Baron Samedit, PrintNightmare)
|
||||
**Effort Estimate:** 5-6 story points across 3 sprints
|
||||
**Priority:** Medium (validation infrastructure)
|
||||
|
||||
### Background
|
||||
#### Advisory Requirements
|
||||
The original advisory specified:
|
||||
|
||||
> A curated dataset of **stock vs vendor-patched binaries** tied to authoritative **CVE + patch evidence** lets Stella Ops prove (with bytes) that a fix is present, powering deterministic VEX and "evidence-first" decisions.
|
||||
|
||||
> **Starter CVEs (tiny pilot):**
|
||||
> - **Linux:** Dirty Pipe (CVE-2022-0847) - kernel backport showcase
|
||||
> - **Unix userland:** sudo "Baron Samedit" (CVE-2021-3156) - classic multi-distro patch
|
||||
> - **Windows:** PrintNightmare (CVE-2021-34527) - PE and KB workflow
|
||||
|
||||
#### Why Golden Pairs Matter
|
||||
1. **Validation**: Ground truth for testing binary diff accuracy
|
||||
2. **Regression Testing**: Detect if changes break patch detection
|
||||
3. **Precision Metrics**: Measure actual false positive and false negative rates
|
||||
4. **Documentation**: Examples of vendor backport patterns
|
||||
|
||||
#### Existing Capabilities
|
||||
|
||||
| Component | Status | Location |
|
||||
|-----------|--------|----------|
|
||||
| ELF Section Hash Extractor | IN PROGRESS | Batch 001 Sprint 001 |
|
||||
| BinaryDiffV1 Predicate | IN PROGRESS | Batch 001 Sprint 002 |
|
||||
| Function Fingerprinting | EXISTS | `src/BinaryIndex/__Libraries/.../FingerprintModels.cs` |
|
||||
| Build-ID Index | EXISTS | `src/Scanner/.../Index/OfflineBuildIdIndex.cs` |
|
||||
|
||||
#### Gap Analysis
|
||||
|
||||
| Capability | Status |
|
||||
|------------|--------|
|
||||
| Golden pairs data model | MISSING |
|
||||
| Package mirror scripts | MISSING |
|
||||
| Diff pipeline for corpus | MISSING |
|
||||
| Validation harness | MISSING |
|
||||
|
||||
### Sprint Index
|
||||
|
||||
| Sprint | ID | Module | Topic | Status | Owner |
|
||||
|--------|-----|--------|-------|--------|-------|
|
||||
| 1 | SPRINT_20260113_004_001 | TOOLS | Golden Pairs Data Model and Schema | DONE | Guild - Tools |
|
||||
| 2 | SPRINT_20260113_004_002 | TOOLS | Mirror and Diff Pipeline | DONE | Guild - Tools |
|
||||
| 3 | SPRINT_20260113_004_003 | TOOLS | Pilot CVE Corpus (3 CVEs) | BLOCKED | Guild - Tools |
|
||||
|
||||
### Acceptance Criteria (Batch-Level)
|
||||
|
||||
#### Must Have
|
||||
1. **Data Model**
|
||||
- Schema for golden pair metadata (CVE, package, distro, versions)
|
||||
- Support for ELF (Linux) and PE (Windows) binaries
|
||||
- Storage for original and patched binaries with hashes
|
||||
- Links to vendor advisories and patch commits
|
||||
|
||||
2. **Mirror Scripts**
|
||||
- Fetch pre-patch and post-patch package versions
|
||||
- Support Debian and Ubuntu apt repos
|
||||
- Hash verification on download
|
||||
- Deterministic mirroring (reproducible)
|
||||
|
||||
3. **Diff Pipeline**
|
||||
- Run section hash extraction on pairs
|
||||
- Produce comparison JSON report
|
||||
- Compute match and mismatch metrics
|
||||
- Validate against expected outcomes
|
||||
|
||||
4. **Pilot Corpus (3 CVEs)**
|
||||
- CVE-2022-0847 (Dirty Pipe): Linux kernel pair
|
||||
- CVE-2021-3156 (Baron Samedit): sudo binary pair
|
||||
- CVE-2021-34527 (PrintNightmare): Windows spoolsv.dll pair (if PE ready)
|
||||
|
||||
#### Should Have
|
||||
- Debug symbol extraction (dbgsym packages)
|
||||
- Function-level diff report
|
||||
- CI integration for regression testing
|
||||
|
||||
#### Deferred (Out of Scope)
|
||||
- Ghidra and Diaphora integration (separate sprint)
|
||||
- Full multi-distro coverage
|
||||
- Automated corpus updates
|
||||
|
||||
### Technical Context
|
||||
|
||||
#### Repository Layout
|
||||
|
||||
```
|
||||
src/Tools/GoldenPairs/
|
||||
+-- StellaOps.Tools.GoldenPairs/
|
||||
| +-- Models/
|
||||
| | +-- GoldenPairMetadata.cs
|
||||
| | +-- BinaryArtifact.cs
|
||||
| | +-- DiffReport.cs
|
||||
| +-- Services/
|
||||
| | +-- PackageMirrorService.cs
|
||||
| | +-- DiffPipelineService.cs
|
||||
| | +-- ValidationService.cs
|
||||
| +-- Program.cs
|
||||
+-- __Tests/
|
||||
+-- StellaOps.Tools.GoldenPairs.Tests/
|
||||
|
||||
datasets/golden-pairs/
|
||||
+-- CVE-2022-0847/
|
||||
| +-- metadata.json
|
||||
| +-- original/
|
||||
| | +-- vmlinux-5.16.11
|
||||
| | +-- vmlinux-5.16.11.sha256
|
||||
| +-- patched/
|
||||
| | +-- vmlinux-5.16.12
|
||||
| | +-- vmlinux-5.16.12.sha256
|
||||
| +-- diff-report.json
|
||||
| +-- golden-diff.json (expected outcomes)
|
||||
| +-- advisories/
|
||||
| +-- ubuntu-usn-####.md
|
||||
| +-- kernel-commit.txt
|
||||
+-- CVE-2021-3156/
|
||||
| +-- ...
|
||||
+-- index.json (corpus manifest)
|
||||
+-- README.md
|
||||
```
|
||||
|
||||
#### Metadata Schema
|
||||
|
||||
```json
|
||||
{
|
||||
"$schema": "https://stellaops.io/schemas/golden-pair-v1.schema.json",
|
||||
"cve": "CVE-2022-0847",
|
||||
"name": "Dirty Pipe",
|
||||
"description": "Linux kernel pipe buffer flag handling vulnerability",
|
||||
"severity": "high",
|
||||
"artifact": {
|
||||
"name": "vmlinux",
|
||||
"format": "elf",
|
||||
"architecture": "x86_64"
|
||||
},
|
||||
"original": {
|
||||
"package": "linux-image-5.16.11-generic",
|
||||
"version": "5.16.11",
|
||||
"distro": "Ubuntu 22.04",
|
||||
"source": "apt://archive.ubuntu.com/ubuntu",
|
||||
"sha256": "abc123...",
|
||||
"buildId": "def456..."
|
||||
},
|
||||
"patched": {
|
||||
"package": "linux-image-5.16.12-generic",
|
||||
"version": "5.16.12",
|
||||
"distro": "Ubuntu 22.04",
|
||||
"source": "apt://archive.ubuntu.com/ubuntu",
|
||||
"sha256": "ghi789...",
|
||||
"buildId": "jkl012..."
|
||||
},
|
||||
"patch": {
|
||||
"commit": "9d2231c5d74e13b2a0546fee6737ee4446017903",
|
||||
"upstream": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=...",
|
||||
"functions_changed": ["copy_page_to_iter_pipe", "push_pipe"]
|
||||
},
|
||||
"advisories": [
|
||||
{"source": "ubuntu", "id": "USN-5317-1", "url": "https://ubuntu.com/security/notices/USN-5317-1"},
|
||||
{"source": "nvd", "id": "CVE-2022-0847", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847"}
|
||||
],
|
||||
"expected_diff": {
|
||||
"sections_changed": [".text"],
|
||||
"sections_identical": [".rodata", ".data"],
|
||||
"verdict": "patched",
|
||||
"confidence_min": 0.9
|
||||
},
|
||||
"created_at": "2026-01-13T12:00:00Z",
|
||||
"created_by": "StellaOps Golden Pairs Tool v1.0.0"
|
||||
}
|
||||
```
|
||||
|
||||
#### Diff Report Schema
|
||||
|
||||
```json
|
||||
{
|
||||
"cve": "CVE-2022-0847",
|
||||
"original": {"sha256": "...", "buildId": "..."},
|
||||
"patched": {"sha256": "...", "buildId": "..."},
|
||||
"sections": [
|
||||
{"name": ".text", "status": "modified", "original_hash": "...", "patched_hash": "...", "size_delta": 1024},
|
||||
{"name": ".rodata", "status": "identical", "hash": "..."},
|
||||
{"name": ".data", "status": "identical", "hash": "..."}
|
||||
],
|
||||
"verdict": "patched",
|
||||
"confidence": 0.95,
|
||||
"matches_expected": true,
|
||||
"analyzed_at": "2026-01-13T12:00:00Z",
|
||||
"tool_version": "1.0.0"
|
||||
}
|
||||
```
|
||||
|
||||
### Risk Assessment
|
||||
|
||||
| Risk | Likelihood | Impact | Mitigation |
|
||||
|------|------------|--------|------------|
|
||||
| Package availability | Medium | High | Cache packages locally; document alternatives |
|
||||
| Kernel binary size | Medium | Medium | Extract specific objects, not full vmlinux |
|
||||
| Windows PE complexity | High | Medium | Defer PrintNightmare if PE support not ready |
|
||||
| Hash instability | Low | Medium | Pin to specific package versions |
|
||||
|
||||
### Success Metrics
|
||||
- [ ] 3 CVE pairs with complete metadata
|
||||
- [ ] Mirror scripts fetch correct versions
|
||||
- [ ] Diff pipeline produces expected verdicts
|
||||
- [ ] CI regression test passes
|
||||
- [ ] Documentation complete
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Batch 001 Sprint 001 (ELF Section Hashes) should be complete for validation.
|
||||
- Sprint 1 is foundational; Sprint 2 depends on the data model, Sprint 3 depends on the pipeline.
|
||||
- Other 20260113_004_000 planning artifacts are index-only, so parallel edits remain safe.
|
||||
|
||||
```
|
||||
Batch 001 Sprint 001 (ELF Hashes)
|
||||
-> Sprint 1 (Data Model)
|
||||
Sprint 1 (Data Model)
|
||||
-> Sprint 2 (Mirror and Diff Pipeline)
|
||||
Sprint 2 (Mirror and Diff Pipeline)
|
||||
-> Sprint 3 (Pilot Corpus)
|
||||
```
|
||||
|
||||
## Documentation Prerequisites
|
||||
Before starting implementation, reviewers must read:
|
||||
|
||||
- `docs/README.md`
|
||||
- `CLAUDE.md` Section 8 (Code Quality and Determinism Rules)
|
||||
- Batch 001 ELF section hash schema
|
||||
- ELF specification for section analysis
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | INDEX-20260113-004-000-01 | DONE | None | Project Mgmt | Normalize sprint batch index to standard template and ASCII-only formatting. |
|
||||
| 2 | INDEX-20260113-004-000-02 | DONE | None | Project Mgmt | Clarify dependency flow and checkpoint wording without changing scope. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
|------------|--------|-------|
|
||||
| 2026-01-13 | Sprint batch created from advisory analysis. | Project Mgmt |
|
||||
| 2026-01-13 | Normalized sprint file to standard template; ASCII-only cleanup; no semantic changes. | Project Mgmt |
|
||||
| 2026-01-13 | Updated sprint statuses (004_001 DONE, 004_002 DONE, 004_003 BLOCKED). | Tools |
|
||||
|
||||
## Decisions & Risks
|
||||
- **APPROVED 2026-01-13**: Pilot with 3 CVEs; expand corpus in follow-up sprint.
|
||||
- **APPROVED 2026-01-13**: Focus on ELF first; PE support conditional on Batch 001 progress.
|
||||
- **APPROVED 2026-01-13**: Store binaries in datasets/, not in git LFS initially.
|
||||
- **RISK**: Kernel binaries are large; consider extracting specific .ko modules instead.
|
||||
|
||||
## Next Checkpoints
|
||||
- Sprint 1 complete -> Data model ready for population
|
||||
- Sprint 2 complete -> Pipeline can process pairs
|
||||
- Sprint 3 complete -> Pilot corpus validated, CI integrated
|
||||
@@ -1,347 +0,0 @@
|
||||
# Sprint 20260113_004_001_TOOLS - Golden Pairs Data Model & Schema
|
||||
|
||||
## Topic & Scope
|
||||
|
||||
- Define data model for golden pair metadata
|
||||
- Create JSON schema for validation
|
||||
- Implement C# models for tooling
|
||||
- Design storage structure for artifacts
|
||||
- **Working directory:** `src/Tools/GoldenPairs/`
|
||||
|
||||
## Dependencies & Concurrency
|
||||
|
||||
- No blocking dependencies (foundational sprint)
|
||||
- Sprint 2 (Pipeline) depends on this sprint's models
|
||||
- Can proceed in parallel with Batch 001
|
||||
|
||||
## Documentation Prerequisites
|
||||
|
||||
- `docs/README.md`
|
||||
- `CLAUDE.md` Section 8 (Determinism Rules)
|
||||
- ELF section types and flags
|
||||
- PE section characteristics
|
||||
|
||||
## Delivery Tracker
|
||||
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
|---|---------|--------|---------------------------|--------|-----------------|
|
||||
| 1 | GP-MODEL-METADATA-0001 | DONE | None | Guild - Tools | Define `GoldenPairMetadata` record with CVE, artifact, original/patched refs, patch info, advisories, expected diff. |
|
||||
| 2 | GP-MODEL-ARTIFACT-0001 | DONE | None | Guild - Tools | Define `BinaryArtifact` record with package, version, distro, source, hashes, buildId, symbols availability. |
|
||||
| 3 | GP-MODEL-DIFF-0001 | DONE | None | Guild - Tools | Define `GoldenDiffReport` record with section comparison, verdict, confidence, tool version. |
|
||||
| 4 | GP-SCHEMA-JSON-0001 | DONE | Depends on MODEL-* | Guild - Tools | Create JSON Schema `golden-pair-v1.schema.json` for metadata validation. Publish to `docs/schemas/`. |
|
||||
| 5 | GP-SCHEMA-INDEX-0001 | DONE | Depends on SCHEMA-JSON | Guild - Tools | Create corpus index schema `golden-pairs-index.schema.json` for dataset manifest. |
|
||||
| 6 | GP-STORAGE-LAYOUT-0001 | DONE | Depends on MODEL-* | Guild - Tools | Document storage layout in `datasets/golden-pairs/README.md`. Include artifact naming conventions. |
|
||||
| 7 | GP-MODEL-LOADER-0001 | DONE | Depends on all models | Guild - Tools | Implement `GoldenPairLoader` service to read/validate metadata from filesystem. |
|
||||
| 8 | GP-MODEL-TESTS-0001 | DONE | Depends on all above | Guild - Tools | Unit tests for model serialization, schema validation, loader functionality. |
|
||||
|
||||
## Technical Specification
|
||||
|
||||
### Core Models
|
||||
|
||||
```csharp
|
||||
namespace StellaOps.Tools.GoldenPairs.Models;
|
||||
|
||||
/// <summary>
|
||||
/// Metadata for a golden pair (stock vs patched binary).
|
||||
/// </summary>
|
||||
public sealed record GoldenPairMetadata
|
||||
{
|
||||
/// <summary>CVE identifier (e.g., "CVE-2022-0847").</summary>
|
||||
public required string Cve { get; init; }
|
||||
|
||||
/// <summary>Human-readable vulnerability name.</summary>
|
||||
public required string Name { get; init; }
|
||||
|
||||
/// <summary>Brief description of the vulnerability.</summary>
|
||||
public string? Description { get; init; }
|
||||
|
||||
/// <summary>Severity level (critical, high, medium, low).</summary>
|
||||
public required string Severity { get; init; }
|
||||
|
||||
/// <summary>Target artifact information.</summary>
|
||||
public required ArtifactInfo Artifact { get; init; }
|
||||
|
||||
/// <summary>Original (unpatched) binary.</summary>
|
||||
public required BinaryArtifact Original { get; init; }
|
||||
|
||||
/// <summary>Patched binary.</summary>
|
||||
public required BinaryArtifact Patched { get; init; }
|
||||
|
||||
/// <summary>Patch commit/change information.</summary>
|
||||
public required PatchInfo Patch { get; init; }
|
||||
|
||||
/// <summary>Security advisories for this CVE.</summary>
|
||||
public ImmutableArray<AdvisoryRef> Advisories { get; init; } = [];
|
||||
|
||||
/// <summary>Expected diff results for validation.</summary>
|
||||
public required ExpectedDiff ExpectedDiff { get; init; }
|
||||
|
||||
/// <summary>When this pair was created.</summary>
|
||||
public required DateTimeOffset CreatedAt { get; init; }
|
||||
|
||||
/// <summary>Tool version that created this pair.</summary>
|
||||
public required string CreatedBy { get; init; }
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Information about the target artifact.
|
||||
/// </summary>
|
||||
public sealed record ArtifactInfo
|
||||
{
|
||||
/// <summary>Artifact name (e.g., "vmlinux", "sudo", "spoolsv.dll").</summary>
|
||||
public required string Name { get; init; }
|
||||
|
||||
/// <summary>Binary format (elf, pe, macho).</summary>
|
||||
public required string Format { get; init; }
|
||||
|
||||
/// <summary>CPU architecture (x86_64, aarch64, etc.).</summary>
|
||||
public required string Architecture { get; init; }
|
||||
|
||||
/// <summary>Operating system (linux, windows, darwin).</summary>
|
||||
public string Os { get; init; } = "linux";
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// A binary artifact in the golden pair.
|
||||
/// </summary>
|
||||
public sealed record BinaryArtifact
|
||||
{
|
||||
/// <summary>Package name (e.g., "linux-image-5.16.11-generic").</summary>
|
||||
public required string Package { get; init; }
|
||||
|
||||
/// <summary>Package version.</summary>
|
||||
public required string Version { get; init; }
|
||||
|
||||
/// <summary>Distribution (e.g., "Ubuntu 22.04", "Debian 11").</summary>
|
||||
public required string Distro { get; init; }
|
||||
|
||||
/// <summary>Package source (apt://, https://, file://).</summary>
|
||||
public required string Source { get; init; }
|
||||
|
||||
/// <summary>SHA-256 hash of the binary.</summary>
|
||||
public required string Sha256 { get; init; }
|
||||
|
||||
/// <summary>ELF Build-ID or PE GUID (if available).</summary>
|
||||
public string? BuildId { get; init; }
|
||||
|
||||
/// <summary>Debug symbols available.</summary>
|
||||
public bool HasDebugSymbols { get; init; }
|
||||
|
||||
/// <summary>Path to debug symbols package.</summary>
|
||||
public string? DebugSymbolsSource { get; init; }
|
||||
|
||||
/// <summary>Relative path within the package.</summary>
|
||||
public string? PathInPackage { get; init; }
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Information about the security patch.
|
||||
/// </summary>
|
||||
public sealed record PatchInfo
|
||||
{
|
||||
/// <summary>Commit hash of the fix.</summary>
|
||||
public required string Commit { get; init; }
|
||||
|
||||
/// <summary>URL to upstream commit.</summary>
|
||||
public string? Upstream { get; init; }
|
||||
|
||||
/// <summary>Functions changed by the patch.</summary>
|
||||
public ImmutableArray<string> FunctionsChanged { get; init; } = [];
|
||||
|
||||
/// <summary>Files changed by the patch.</summary>
|
||||
public ImmutableArray<string> FilesChanged { get; init; } = [];
|
||||
|
||||
/// <summary>Patch summary.</summary>
|
||||
public string? Summary { get; init; }
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Reference to a security advisory.
|
||||
/// </summary>
|
||||
public sealed record AdvisoryRef
|
||||
{
|
||||
/// <summary>Advisory source (ubuntu, debian, nvd, msrc, etc.).</summary>
|
||||
public required string Source { get; init; }
|
||||
|
||||
/// <summary>Advisory identifier (e.g., "USN-5317-1").</summary>
|
||||
public required string Id { get; init; }
|
||||
|
||||
/// <summary>URL to the advisory.</summary>
|
||||
public required string Url { get; init; }
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Expected diff results for validation.
|
||||
/// </summary>
|
||||
public sealed record ExpectedDiff
|
||||
{
|
||||
/// <summary>Sections expected to be modified.</summary>
|
||||
public ImmutableArray<string> SectionsChanged { get; init; } = [];
|
||||
|
||||
/// <summary>Sections expected to be identical.</summary>
|
||||
public ImmutableArray<string> SectionsIdentical { get; init; } = [];
|
||||
|
||||
/// <summary>Expected verdict (patched, vanilla, unknown).</summary>
|
||||
public required string Verdict { get; init; }
|
||||
|
||||
/// <summary>Minimum confidence score expected.</summary>
|
||||
public double ConfidenceMin { get; init; } = 0.9;
|
||||
}
|
||||
```
|
||||
|
||||
### Diff Report Model
|
||||
|
||||
```csharp
|
||||
/// <summary>
|
||||
/// Report from comparing a golden pair.
|
||||
/// </summary>
|
||||
public sealed record GoldenDiffReport
|
||||
{
|
||||
/// <summary>CVE being analyzed.</summary>
|
||||
public required string Cve { get; init; }
|
||||
|
||||
/// <summary>Original binary info.</summary>
|
||||
public required ArtifactHashInfo Original { get; init; }
|
||||
|
||||
/// <summary>Patched binary info.</summary>
|
||||
public required ArtifactHashInfo Patched { get; init; }
|
||||
|
||||
/// <summary>Section-by-section comparison.</summary>
|
||||
public required ImmutableArray<SectionComparison> Sections { get; init; }
|
||||
|
||||
/// <summary>Overall verdict.</summary>
|
||||
public required string Verdict { get; init; }
|
||||
|
||||
/// <summary>Confidence score (0.0-1.0).</summary>
|
||||
public required double Confidence { get; init; }
|
||||
|
||||
/// <summary>Whether result matches expected.</summary>
|
||||
public required bool MatchesExpected { get; init; }
|
||||
|
||||
/// <summary>Discrepancies from expected (if any).</summary>
|
||||
public ImmutableArray<string> Discrepancies { get; init; } = [];
|
||||
|
||||
/// <summary>Analysis timestamp.</summary>
|
||||
public required DateTimeOffset AnalyzedAt { get; init; }
|
||||
|
||||
/// <summary>Tool version.</summary>
|
||||
public required string ToolVersion { get; init; }
|
||||
}
|
||||
|
||||
public sealed record ArtifactHashInfo
|
||||
{
|
||||
public required string Sha256 { get; init; }
|
||||
public string? BuildId { get; init; }
|
||||
}
|
||||
|
||||
public sealed record SectionComparison
|
||||
{
|
||||
public required string Name { get; init; }
|
||||
public required string Status { get; init; } // identical, modified, added, removed
|
||||
public string? OriginalHash { get; init; }
|
||||
public string? PatchedHash { get; init; }
|
||||
public long? SizeDelta { get; init; }
|
||||
}
|
||||
```
|
||||
|
||||
### JSON Schema (Excerpt)
|
||||
|
||||
```json
|
||||
{
|
||||
"$schema": "https://json-schema.org/draft/2020-12/schema",
|
||||
"$id": "https://stellaops.io/schemas/golden-pair-v1.schema.json",
|
||||
"title": "GoldenPairMetadata",
|
||||
"type": "object",
|
||||
"required": ["cve", "name", "severity", "artifact", "original", "patched", "patch", "expectedDiff", "createdAt", "createdBy"],
|
||||
"properties": {
|
||||
"cve": {
|
||||
"type": "string",
|
||||
"pattern": "^CVE-\\d{4}-\\d{4,}$"
|
||||
},
|
||||
"name": { "type": "string", "minLength": 1 },
|
||||
"severity": { "enum": ["critical", "high", "medium", "low"] },
|
||||
"artifact": { "$ref": "#/$defs/ArtifactInfo" },
|
||||
"original": { "$ref": "#/$defs/BinaryArtifact" },
|
||||
"patched": { "$ref": "#/$defs/BinaryArtifact" },
|
||||
"patch": { "$ref": "#/$defs/PatchInfo" },
|
||||
"advisories": {
|
||||
"type": "array",
|
||||
"items": { "$ref": "#/$defs/AdvisoryRef" }
|
||||
},
|
||||
"expectedDiff": { "$ref": "#/$defs/ExpectedDiff" },
|
||||
"createdAt": { "type": "string", "format": "date-time" },
|
||||
"createdBy": { "type": "string" }
|
||||
},
|
||||
"$defs": {
|
||||
"ArtifactInfo": {
|
||||
"type": "object",
|
||||
"required": ["name", "format", "architecture"],
|
||||
"properties": {
|
||||
"name": { "type": "string" },
|
||||
"format": { "enum": ["elf", "pe", "macho"] },
|
||||
"architecture": { "type": "string" }
|
||||
}
|
||||
}
|
||||
// ... additional definitions
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Storage Layout
|
||||
|
||||
```
|
||||
datasets/golden-pairs/
|
||||
+-- index.json # Corpus manifest
|
||||
+-- README.md # Documentation
|
||||
+-- CVE-2022-0847/
|
||||
| +-- metadata.json # GoldenPairMetadata
|
||||
| +-- original/
|
||||
| | +-- vmlinux # Unpatched binary
|
||||
| | +-- vmlinux.sha256 # Hash file
|
||||
| | +-- vmlinux.sections.json # Pre-computed section hashes
|
||||
| +-- patched/
|
||||
| | +-- vmlinux # Patched binary
|
||||
| | +-- vmlinux.sha256
|
||||
| | +-- vmlinux.sections.json
|
||||
| +-- diff-report.json # Comparison output
|
||||
| +-- advisories/
|
||||
| +-- USN-5317-1.txt # Advisory text
|
||||
+-- CVE-2021-3156/
|
||||
+-- ...
|
||||
```
|
||||
|
||||
## Determinism Requirements
|
||||
|
||||
1. **Hashes**: SHA-256 lowercase hex, no prefix
|
||||
2. **Timestamps**: UTC ISO-8601
|
||||
3. **Ordering**: Sections sorted by name; advisories sorted by source+id
|
||||
4. **JSON**: Canonical formatting (sorted keys, 2-space indent)
|
||||
|
||||
## Test Cases
|
||||
|
||||
| Test | Description | Expected |
|
||||
|------|-------------|----------|
|
||||
| `Serialize_RoundTrip_Identical` | Serialize then deserialize | Identical metadata |
|
||||
| `Validate_ValidSchema_Passes` | Valid JSON against schema | Validation passes |
|
||||
| `Validate_MissingCve_Fails` | Missing required field | Validation fails |
|
||||
| `Load_ExistingPair_ReturnsMetadata` | Load from filesystem | Correct metadata |
|
||||
| `Load_MissingFiles_ReturnsError` | Missing artifact files | Error with details |
|
||||
|
||||
## Execution Log
|
||||
|
||||
| Date (UTC) | Update | Owner |
|
||||
|------------|--------|-------|
|
||||
| 2026-01-13 | Sprint created from advisory analysis. | Project Mgmt |
|
||||
| 2026-01-13 | Implemented models, schemas, loader, and tests; documented corpus layout. | Tools |
|
||||
|
||||
## Decisions & Risks
|
||||
|
||||
- **APPROVED**: Store binaries outside git, reference by hash.
|
||||
- **APPROVED**: Pre-compute section hashes for faster diff pipeline.
|
||||
- **RISK**: Large binaries may exceed storage limits; use compression.
|
||||
|
||||
## Next Checkpoints
|
||||
|
||||
- Task 1-3 complete -> Core models ready
|
||||
- Task 4-6 complete -> Schema and storage documented
|
||||
- Task 7-8 complete -> Sprint can be marked DONE
|
||||
@@ -1,332 +0,0 @@
|
||||
# Sprint 20260113_004_002_TOOLS - Mirror & Diff Pipeline
|
||||
|
||||
## Topic & Scope
|
||||
|
||||
- Implement package mirror service for Debian/Ubuntu
|
||||
- Create diff pipeline service for golden pair validation
|
||||
- Build validation harness for expected outcomes
|
||||
- Support reproducible artifact fetching
|
||||
- **Working directory:** `src/Tools/GoldenPairs/`
|
||||
|
||||
## Dependencies & Concurrency
|
||||
|
||||
- **Depends on:** Sprint 004_001 (Data Model)
|
||||
- **Depends on:** Batch 001 Sprint 001 (ELF Section Hashes)
|
||||
- Sprint 3 (Pilot Corpus) depends on this sprint
|
||||
|
||||
## Documentation Prerequisites
|
||||
|
||||
- `docs/README.md`
|
||||
- `CLAUDE.md` Section 8 (Determinism Rules)
|
||||
- Sprint 004_001 data models
|
||||
- Batch 001 `ElfSectionHashExtractor` interface
|
||||
- Debian/Ubuntu apt repository structure
|
||||
|
||||
## Delivery Tracker
|
||||
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
|---|---------|--------|---------------------------|--------|-----------------|
|
||||
| 1 | GP-MIRROR-INTERFACE-0001 | DONE | None | Guild - Tools | Define `IPackageMirrorService` interface with `FetchAsync(artifact, destination, ct)` signature. Support verification and resume. |
|
||||
| 2 | GP-MIRROR-APT-0001 | DONE | Depends on INTERFACE | Guild - Tools | Implement `AptPackageMirrorService` for Debian/Ubuntu. Parse Packages.gz, download .deb, extract target binary. |
|
||||
| 3 | GP-MIRROR-VERIFY-0001 | DONE | Depends on APT | Guild - Tools | Implement hash verification: compare downloaded SHA-256 with metadata. Fail if mismatch. |
|
||||
| 4 | GP-DIFF-INTERFACE-0001 | DONE | Sprint 001 models | Guild - Tools | Define `IDiffPipelineService` interface with `DiffAsync(pair, ct)` returning `GoldenDiffReport`. |
|
||||
| 5 | GP-DIFF-IMPL-0001 | DONE | Depends on INTERFACE, Batch 001 | Guild - Tools | Implement `DiffPipelineService` that: loads metadata, extracts section hashes, compares, produces report. |
|
||||
| 6 | GP-DIFF-VALIDATE-0001 | DONE | Depends on IMPL | Guild - Tools | Implement validation against `expectedDiff`: check sections changed/identical, verdict, confidence threshold. |
|
||||
| 7 | GP-CLI-MIRROR-0001 | DONE | Depends on MIRROR-* | Guild - Tools | Add `golden-pairs mirror <cve>` CLI command to fetch artifacts for a pair. |
|
||||
| 8 | GP-CLI-DIFF-0001 | DONE | Depends on DIFF-* | Guild - Tools | Add `golden-pairs diff <cve>` CLI command to run diff and validation. |
|
||||
| 9 | GP-CLI-VALIDATE-0001 | DONE | Depends on all above | Guild - Tools | Add `golden-pairs validate` CLI command to run all pairs and produce summary. |
|
||||
| 10 | GP-TESTS-0001 | DONE | Depends on all above | Guild - Tools | Unit and integration tests for mirror, diff, validation services. |
|
||||
|
||||
## Technical Specification
|
||||
|
||||
### Mirror Service Interface
|
||||
|
||||
```csharp
|
||||
namespace StellaOps.Tools.GoldenPairs.Services;
|
||||
|
||||
/// <summary>
|
||||
/// Service for mirroring package artifacts.
|
||||
/// </summary>
|
||||
public interface IPackageMirrorService
|
||||
{
|
||||
/// <summary>
|
||||
/// Fetches an artifact from its source.
|
||||
/// </summary>
|
||||
/// <param name="artifact">Artifact to fetch.</param>
|
||||
/// <param name="destination">Local destination path.</param>
|
||||
/// <param name="cancellationToken">Cancellation token.</param>
|
||||
/// <returns>Result with hash and path.</returns>
|
||||
Task<MirrorResult> FetchAsync(
|
||||
BinaryArtifact artifact,
|
||||
string destination,
|
||||
CancellationToken cancellationToken = default);
|
||||
|
||||
/// <summary>
|
||||
/// Verifies a local artifact against expected hash.
|
||||
/// </summary>
|
||||
Task<bool> VerifyAsync(
|
||||
string path,
|
||||
string expectedSha256,
|
||||
CancellationToken cancellationToken = default);
|
||||
}
|
||||
|
||||
public sealed record MirrorResult
|
||||
{
|
||||
public required bool Success { get; init; }
|
||||
public required string LocalPath { get; init; }
|
||||
public required string ActualSha256 { get; init; }
|
||||
public bool HashMatches { get; init; }
|
||||
public string? ErrorMessage { get; init; }
|
||||
public long BytesDownloaded { get; init; }
|
||||
}
|
||||
```
|
||||
|
||||
### Apt Mirror Implementation
|
||||
|
||||
```csharp
|
||||
public class AptPackageMirrorService : IPackageMirrorService
|
||||
{
|
||||
private readonly IHttpClientFactory _httpClientFactory;
|
||||
private readonly ILogger<AptPackageMirrorService> _logger;
|
||||
|
||||
public async Task<MirrorResult> FetchAsync(
|
||||
BinaryArtifact artifact,
|
||||
string destination,
|
||||
CancellationToken ct = default)
|
||||
{
|
||||
// Parse source URI: apt://archive.ubuntu.com/ubuntu/pool/main/l/linux/...
|
||||
var uri = ParseAptUri(artifact.Source);
|
||||
|
||||
// Download .deb package
|
||||
var debPath = Path.Combine(destination, $"{artifact.Package}.deb");
|
||||
await DownloadWithRetryAsync(uri, debPath, ct);
|
||||
|
||||
// Extract target binary from .deb
|
||||
var binaryPath = await ExtractFromDebAsync(debPath, artifact.PathInPackage, destination, ct);
|
||||
|
||||
// Verify hash
|
||||
var actualHash = await ComputeSha256Async(binaryPath, ct);
|
||||
var hashMatches = string.Equals(actualHash, artifact.Sha256, StringComparison.OrdinalIgnoreCase);
|
||||
|
||||
return new MirrorResult
|
||||
{
|
||||
Success = hashMatches,
|
||||
LocalPath = binaryPath,
|
||||
ActualSha256 = actualHash,
|
||||
HashMatches = hashMatches,
|
||||
ErrorMessage = hashMatches ? null : $"Hash mismatch: expected {artifact.Sha256}, got {actualHash}"
|
||||
};
|
||||
}
|
||||
|
||||
private async Task<string> ExtractFromDebAsync(
|
||||
string debPath,
|
||||
string? pathInPackage,
|
||||
string destination,
|
||||
CancellationToken ct)
|
||||
{
|
||||
// .deb is ar archive containing data.tar.* with actual files
|
||||
// Use ar + tar to extract, or SharpCompress library
|
||||
// ...
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Diff Pipeline Interface
|
||||
|
||||
```csharp
|
||||
/// <summary>
|
||||
/// Pipeline for diffing golden pairs.
|
||||
/// </summary>
|
||||
public interface IDiffPipelineService
|
||||
{
|
||||
/// <summary>
|
||||
/// Runs diff analysis on a golden pair.
|
||||
/// </summary>
|
||||
Task<GoldenDiffReport> DiffAsync(
|
||||
GoldenPairMetadata pair,
|
||||
DiffOptions? options = null,
|
||||
CancellationToken cancellationToken = default);
|
||||
|
||||
/// <summary>
|
||||
/// Validates a diff report against expected outcomes.
|
||||
/// </summary>
|
||||
ValidationResult Validate(GoldenDiffReport report, ExpectedDiff expected);
|
||||
}
|
||||
|
||||
public sealed record DiffOptions
|
||||
{
|
||||
/// <summary>Sections to analyze (default: all).</summary>
|
||||
public ImmutableArray<string>? SectionFilter { get; init; }
|
||||
|
||||
/// <summary>Skip hash computation if pre-computed hashes exist.</summary>
|
||||
public bool UsePrecomputedHashes { get; init; } = true;
|
||||
|
||||
/// <summary>Include function-level analysis if debug symbols available.</summary>
|
||||
public bool IncludeFunctionAnalysis { get; init; } = false;
|
||||
}
|
||||
|
||||
public sealed record ValidationResult
|
||||
{
|
||||
public required bool IsValid { get; init; }
|
||||
public required ImmutableArray<string> Errors { get; init; }
|
||||
public required ImmutableArray<string> Warnings { get; init; }
|
||||
}
|
||||
```
|
||||
|
||||
### Diff Pipeline Implementation
|
||||
|
||||
```csharp
|
||||
public class DiffPipelineService : IDiffPipelineService
|
||||
{
|
||||
private readonly IElfSectionHashExtractor _elfExtractor;
|
||||
private readonly TimeProvider _timeProvider;
|
||||
private readonly ILogger<DiffPipelineService> _logger;
|
||||
|
||||
public async Task<GoldenDiffReport> DiffAsync(
|
||||
GoldenPairMetadata pair,
|
||||
DiffOptions? options = null,
|
||||
CancellationToken ct = default)
|
||||
{
|
||||
options ??= new DiffOptions();
|
||||
|
||||
// Get or compute section hashes
|
||||
var originalHashes = await GetSectionHashesAsync(pair, isOriginal: true, options, ct);
|
||||
var patchedHashes = await GetSectionHashesAsync(pair, isOriginal: false, options, ct);
|
||||
|
||||
// Compare sections
|
||||
var sections = CompareSections(originalHashes, patchedHashes, options.SectionFilter);
|
||||
|
||||
// Determine verdict
|
||||
var (verdict, confidence) = DetermineVerdict(sections, pair.ExpectedDiff);
|
||||
|
||||
// Validate against expected
|
||||
var matchesExpected = ValidateAgainstExpected(sections, verdict, confidence, pair.ExpectedDiff);
|
||||
|
||||
return new GoldenDiffReport
|
||||
{
|
||||
Cve = pair.Cve,
|
||||
Original = new ArtifactHashInfo { Sha256 = pair.Original.Sha256, BuildId = pair.Original.BuildId },
|
||||
Patched = new ArtifactHashInfo { Sha256 = pair.Patched.Sha256, BuildId = pair.Patched.BuildId },
|
||||
Sections = sections,
|
||||
Verdict = verdict,
|
||||
Confidence = confidence,
|
||||
MatchesExpected = matchesExpected.IsValid,
|
||||
Discrepancies = matchesExpected.Errors,
|
||||
AnalyzedAt = _timeProvider.GetUtcNow(),
|
||||
ToolVersion = GetToolVersion()
|
||||
};
|
||||
}
|
||||
|
||||
private (string verdict, double confidence) DetermineVerdict(
|
||||
ImmutableArray<SectionComparison> sections,
|
||||
ExpectedDiff expected)
|
||||
{
|
||||
var textSection = sections.FirstOrDefault(s => s.Name == ".text");
|
||||
|
||||
if (textSection is null)
|
||||
return ("unknown", 0.5);
|
||||
|
||||
if (textSection.Status == "modified")
|
||||
{
|
||||
// .text changed -> likely patched
|
||||
var otherChanges = sections.Count(s => s.Status == "modified" && s.Name != ".text");
|
||||
var confidence = otherChanges > 2 ? 0.7 : 0.95; // Too many changes = less certain
|
||||
return ("patched", confidence);
|
||||
}
|
||||
|
||||
if (textSection.Status == "identical")
|
||||
{
|
||||
return ("vanilla", 0.9);
|
||||
}
|
||||
|
||||
return ("unknown", 0.5);
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### CLI Commands
|
||||
|
||||
```
|
||||
golden-pairs <command>
|
||||
|
||||
Commands:
|
||||
mirror <cve> Fetch artifacts for a golden pair
|
||||
diff <cve> Run diff analysis on a golden pair
|
||||
validate Validate all golden pairs in corpus
|
||||
list List all available golden pairs
|
||||
|
||||
Examples:
|
||||
golden-pairs mirror CVE-2022-0847
|
||||
golden-pairs diff CVE-2022-0847 --output json
|
||||
golden-pairs validate --fail-fast
|
||||
```
|
||||
|
||||
### CI Integration
|
||||
|
||||
```yaml
|
||||
# .gitea/workflows/golden-pairs-validation.yml
|
||||
name: Golden Pairs Validation
|
||||
|
||||
on:
|
||||
push:
|
||||
paths:
|
||||
- 'datasets/golden-pairs/**'
|
||||
- 'src/Tools/GoldenPairs/**'
|
||||
schedule:
|
||||
- cron: '0 0 * * 0' # Weekly
|
||||
|
||||
jobs:
|
||||
validate:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-dotnet@v4
|
||||
- run: dotnet build src/Tools/GoldenPairs/
|
||||
- run: dotnet run --project src/Tools/GoldenPairs/ -- validate --output trx
|
||||
- uses: dorny/test-reporter@v1
|
||||
with:
|
||||
name: Golden Pairs
|
||||
path: 'golden-pairs.trx'
|
||||
reporter: dotnet-trx
|
||||
```
|
||||
|
||||
## Determinism Requirements
|
||||
|
||||
1. **Download order**: Single-threaded to ensure reproducibility
|
||||
2. **Hash computation**: Identical algorithm as Batch 001
|
||||
3. **Timestamps**: From injected `TimeProvider`
|
||||
4. **Report ordering**: Sections sorted by name
|
||||
|
||||
## Test Cases
|
||||
|
||||
| Test | Description | Expected |
|
||||
|------|-------------|----------|
|
||||
| `Mirror_ValidPackage_Downloads` | Download existing package | Success, hash matches |
|
||||
| `Mirror_MissingPackage_Fails` | Download non-existent package | Failure with error message |
|
||||
| `Mirror_HashMismatch_Fails` | Download with wrong hash | Failure, hash mismatch reported |
|
||||
| `Diff_ModifiedText_ReturnsPatched` | Pair with .text changed | Verdict: patched |
|
||||
| `Diff_IdenticalAll_ReturnsVanilla` | Pair with no changes | Verdict: vanilla |
|
||||
| `Validate_MatchesExpected_Passes` | Diff matches expectedDiff | IsValid: true |
|
||||
| `Validate_WrongVerdict_Fails` | Diff disagrees with expected | IsValid: false, error listed |
|
||||
|
||||
## Execution Log
|
||||
|
||||
| Date (UTC) | Update | Owner |
|
||||
|------------|--------|-------|
|
||||
| 2026-01-13 | Sprint created from advisory analysis. | Project Mgmt |
|
||||
| 2026-01-13 | Implemented mirror, diff pipeline, CLI commands, and tests. | Tools |
|
||||
|
||||
## Decisions & Risks
|
||||
|
||||
- **APPROVED**: Support apt:// sources first; add RPM later.
|
||||
- **APPROVED**: Cache downloaded packages locally to avoid re-fetch.
|
||||
- **RISK**: Apt repository structure may vary; handle exceptions gracefully.
|
||||
- **RISK**: Some packages may be removed from mirrors; document fallbacks.
|
||||
- **NOTE**: Apt mirror expects direct package URLs; Packages.gz lookup deferred.
|
||||
|
||||
## Next Checkpoints
|
||||
|
||||
- Task 1-3 complete -> Mirror service operational
|
||||
- Task 4-6 complete -> Diff pipeline operational
|
||||
- Task 7-9 complete -> CLI usable
|
||||
- Task 10 complete -> Sprint can be marked DONE
|
||||
@@ -1,261 +0,0 @@
|
||||
# Sprint 20260113_004_003_TOOLS - Pilot CVE Corpus (3 CVEs)
|
||||
|
||||
## Topic & Scope
|
||||
|
||||
- Populate pilot corpus with 3 CVE golden pairs
|
||||
- CVE-2022-0847 (Dirty Pipe): Linux kernel
|
||||
- CVE-2021-3156 (Baron Samedit): sudo userland
|
||||
- CVE-2021-34527 (PrintNightmare): Windows PE (conditional)
|
||||
- Document each pair with advisories and patch info
|
||||
- **Working directory:** `datasets/golden-pairs/`
|
||||
|
||||
## Dependencies & Concurrency
|
||||
|
||||
- **Depends on:** Sprint 004_001 (Data Model)
|
||||
- **Depends on:** Sprint 004_002 (Pipeline)
|
||||
- **Depends on:** Batch 001 Sprint 001 (ELF Section Hashes) for validation
|
||||
- Final sprint in batch
|
||||
|
||||
## Documentation Prerequisites
|
||||
|
||||
- Sprint 004_001 data models
|
||||
- Sprint 004_002 pipeline services
|
||||
- Vulnerability details for each CVE
|
||||
- Package sources for target distros
|
||||
|
||||
## Delivery Tracker
|
||||
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
|---|---------|--------|---------------------------|--------|-----------------|
|
||||
| 1 | GP-CORPUS-DIRTYPIPE-META-0001 | BLOCKED | None | Guild - Tools | Create `CVE-2022-0847/metadata.json` with full golden pair metadata. Identify Ubuntu 22.04 kernel package versions. |
|
||||
| 2 | GP-CORPUS-DIRTYPIPE-FETCH-0001 | BLOCKED | Depends on META, Sprint 002 | Guild - Tools | Fetch vmlinux binaries for pre-patch (5.16.11) and post-patch (5.16.12) versions using mirror service. |
|
||||
| 3 | GP-CORPUS-DIRTYPIPE-DIFF-0001 | BLOCKED | Depends on FETCH | Guild - Tools | Run diff pipeline, validate .text section change, verify verdict matches expected. |
|
||||
| 4 | GP-CORPUS-DIRTYPIPE-DOCS-0001 | BLOCKED | Depends on all above | Guild - Tools | Document advisory links, patch commit, functions changed. Archive advisory PDFs. |
|
||||
| 5 | GP-CORPUS-BARON-META-0001 | BLOCKED | None | Guild - Tools | Create `CVE-2021-3156/metadata.json`. Identify Debian 11 sudo package versions. |
|
||||
| 6 | GP-CORPUS-BARON-FETCH-0001 | BLOCKED | Depends on META, Sprint 002 | Guild - Tools | Fetch sudo binaries for pre-patch and post-patch versions. |
|
||||
| 7 | GP-CORPUS-BARON-DIFF-0001 | BLOCKED | Depends on FETCH | Guild - Tools | Run diff pipeline, validate, verify verdict. |
|
||||
| 8 | GP-CORPUS-BARON-DOCS-0001 | BLOCKED | Depends on all above | Guild - Tools | Document advisory links, patch commit. |
|
||||
| 9 | GP-CORPUS-PRINT-META-0001 | BLOCKED (CONDITIONAL) | PE support ready | Guild - Tools | Create `CVE-2021-34527/metadata.json` if PE section hashing available. |
|
||||
| 10 | GP-CORPUS-INDEX-0001 | BLOCKED | Depends on all pairs | Guild - Tools | Create `index.json` corpus manifest listing all pairs with summary. |
|
||||
| 11 | GP-CORPUS-README-0001 | BLOCKED | Depends on INDEX | Guild - Tools | Create `README.md` with corpus documentation, usage instructions, extension guide. |
|
||||
| 12 | GP-CORPUS-CI-0001 | BLOCKED | Depends on all above | Guild - Tools | Add CI workflow to validate corpus on changes. Integrate with test reporting. |
|
||||
|
||||
## Technical Specification
|
||||
|
||||
### CVE-2022-0847 (Dirty Pipe)
|
||||
|
||||
**Vulnerability:** Linux kernel pipe buffer flag handling allows privilege escalation.
|
||||
|
||||
**Target:**
|
||||
- Binary: `vmlinux` (or specific .ko module `fs/pipe.c`)
|
||||
- Architecture: x86_64
|
||||
- Format: ELF
|
||||
|
||||
**Package Sources (Ubuntu 22.04):**
|
||||
- Pre-patch: `linux-image-5.16.11-generic` from `archive.ubuntu.com`
|
||||
- Post-patch: `linux-image-5.16.12-generic`
|
||||
|
||||
**Patch Info:**
|
||||
- Commit: `9d2231c5d74e13b2a0546fee6737ee4446017903`
|
||||
- Functions: `copy_page_to_iter_pipe`, `push_pipe`
|
||||
- Files: `fs/pipe.c`, `lib/iov_iter.c`
|
||||
|
||||
**Expected Diff:**
|
||||
- `.text`: MODIFIED (vulnerability fix)
|
||||
- `.rodata`: IDENTICAL or MODIFIED (string changes)
|
||||
- Verdict: `patched`
|
||||
- Confidence: >= 0.9
|
||||
|
||||
**Advisories:**
|
||||
- USN-5317-1: https://ubuntu.com/security/notices/USN-5317-1
|
||||
- NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-0847
|
||||
|
||||
### CVE-2021-3156 (Baron Samedit)
|
||||
|
||||
**Vulnerability:** Heap-based buffer overflow in sudo sudoedit.
|
||||
|
||||
**Target:**
|
||||
- Binary: `/usr/bin/sudo`
|
||||
- Architecture: x86_64
|
||||
- Format: ELF
|
||||
|
||||
**Package Sources (Debian 11):**
|
||||
- Pre-patch: `sudo_1.9.5p2-3` from `snapshot.debian.org`
|
||||
- Post-patch: `sudo_1.9.5p2-3+deb11u1`
|
||||
|
||||
**Patch Info:**
|
||||
- Functions: `set_cmnd`, `sudoedit_setup`
|
||||
- Files: `src/sudoers.c`, `src/sudoedit.c`
|
||||
|
||||
**Expected Diff:**
|
||||
- `.text`: MODIFIED
|
||||
- Verdict: `patched`
|
||||
|
||||
**Advisories:**
|
||||
- DSA-4839-1: https://www.debian.org/security/2021/dsa-4839
|
||||
- NVD: https://nvd.nist.gov/vuln/detail/CVE-2021-3156
|
||||
|
||||
### CVE-2021-34527 (PrintNightmare) - CONDITIONAL
|
||||
|
||||
**Vulnerability:** Windows Print Spooler remote code execution.
|
||||
|
||||
**Target:**
|
||||
- Binary: `spoolsv.dll` or `localspl.dll`
|
||||
- Architecture: x64
|
||||
- Format: PE
|
||||
|
||||
**Condition:** Only include if PE section hashing from Batch 001 is available.
|
||||
|
||||
**Package Sources:**
|
||||
- Microsoft Update Catalog KB5004945
|
||||
- Or: Extract from Windows ISO
|
||||
|
||||
**Expected Diff:**
|
||||
- `.text`: MODIFIED
|
||||
- Verdict: `patched`
|
||||
|
||||
### Metadata Template
|
||||
|
||||
```json
|
||||
{
|
||||
"cve": "CVE-2022-0847",
|
||||
"name": "Dirty Pipe",
|
||||
"description": "A flaw was found in the way the pipe buffer flag was handled in the Linux kernel. An unprivileged local user could exploit this flaw to overwrite data in arbitrary read-only files.",
|
||||
"severity": "high",
|
||||
"artifact": {
|
||||
"name": "vmlinux",
|
||||
"format": "elf",
|
||||
"architecture": "x86_64",
|
||||
"os": "linux"
|
||||
},
|
||||
"original": {
|
||||
"package": "linux-image-5.16.11-generic",
|
||||
"version": "5.16.11",
|
||||
"distro": "Ubuntu 22.04",
|
||||
"source": "apt://archive.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-5.16.11-generic_5.16.11-amd64.deb",
|
||||
"sha256": "TODO_COMPUTE_AFTER_FETCH",
|
||||
"buildId": "TODO_EXTRACT_AFTER_FETCH",
|
||||
"hasDebugSymbols": false,
|
||||
"pathInPackage": "/boot/vmlinux-5.16.11-generic"
|
||||
},
|
||||
"patched": {
|
||||
"package": "linux-image-5.16.12-generic",
|
||||
"version": "5.16.12",
|
||||
"distro": "Ubuntu 22.04",
|
||||
"source": "apt://archive.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-5.16.12-generic_5.16.12-amd64.deb",
|
||||
"sha256": "TODO_COMPUTE_AFTER_FETCH",
|
||||
"buildId": "TODO_EXTRACT_AFTER_FETCH",
|
||||
"hasDebugSymbols": false,
|
||||
"pathInPackage": "/boot/vmlinux-5.16.12-generic"
|
||||
},
|
||||
"patch": {
|
||||
"commit": "9d2231c5d74e13b2a0546fee6737ee4446017903",
|
||||
"upstream": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d2231c5d74e13b2a0546fee6737ee4446017903",
|
||||
"functionsChanged": ["copy_page_to_iter_pipe", "push_pipe"],
|
||||
"filesChanged": ["fs/pipe.c", "lib/iov_iter.c"],
|
||||
"summary": "Fix PIPE_BUF_FLAG_CAN_MERGE handling to prevent arbitrary file overwrites"
|
||||
},
|
||||
"advisories": [
|
||||
{
|
||||
"source": "ubuntu",
|
||||
"id": "USN-5317-1",
|
||||
"url": "https://ubuntu.com/security/notices/USN-5317-1"
|
||||
},
|
||||
{
|
||||
"source": "nvd",
|
||||
"id": "CVE-2022-0847",
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847"
|
||||
}
|
||||
],
|
||||
"expectedDiff": {
|
||||
"sectionsChanged": [".text"],
|
||||
"sectionsIdentical": [".rodata", ".data", ".bss"],
|
||||
"verdict": "patched",
|
||||
"confidenceMin": 0.9
|
||||
},
|
||||
"createdAt": "2026-01-13T12:00:00Z",
|
||||
"createdBy": "StellaOps Golden Pairs Tool v1.0.0"
|
||||
}
|
||||
```
|
||||
|
||||
### Corpus Index
|
||||
|
||||
```json
|
||||
{
|
||||
"version": "1.0.0",
|
||||
"generatedAt": "2026-01-13T12:00:00Z",
|
||||
"pairs": [
|
||||
{
|
||||
"cve": "CVE-2022-0847",
|
||||
"name": "Dirty Pipe",
|
||||
"severity": "high",
|
||||
"format": "elf",
|
||||
"status": "validated",
|
||||
"lastValidated": "2026-01-13T12:00:00Z"
|
||||
},
|
||||
{
|
||||
"cve": "CVE-2021-3156",
|
||||
"name": "Baron Samedit",
|
||||
"severity": "high",
|
||||
"format": "elf",
|
||||
"status": "validated",
|
||||
"lastValidated": "2026-01-13T12:00:00Z"
|
||||
}
|
||||
],
|
||||
"summary": {
|
||||
"total": 2,
|
||||
"validated": 2,
|
||||
"failed": 0
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Validation Workflow
|
||||
|
||||
```bash
|
||||
# 1. Fetch artifacts
|
||||
golden-pairs mirror CVE-2022-0847
|
||||
golden-pairs mirror CVE-2021-3156
|
||||
|
||||
# 2. Run diff analysis
|
||||
golden-pairs diff CVE-2022-0847 --output json > CVE-2022-0847/diff-report.json
|
||||
golden-pairs diff CVE-2021-3156 --output json > CVE-2021-3156/diff-report.json
|
||||
|
||||
# 3. Validate all
|
||||
golden-pairs validate --all
|
||||
# Expected output:
|
||||
# CVE-2022-0847: PASS (verdict=patched, confidence=0.95)
|
||||
# CVE-2021-3156: PASS (verdict=patched, confidence=0.92)
|
||||
# Summary: 2/2 passed
|
||||
```
|
||||
|
||||
## Test Cases
|
||||
|
||||
| Test | Description | Expected |
|
||||
|------|-------------|----------|
|
||||
| `DirtyPipe_Validate_Passes` | Full pipeline for CVE-2022-0847 | Verdict: patched, matches expected |
|
||||
| `BaronSamedit_Validate_Passes` | Full pipeline for CVE-2021-3156 | Verdict: patched, matches expected |
|
||||
| `Index_AllPairs_Listed` | Load index.json | All pairs enumerated |
|
||||
| `CI_Workflow_Succeeds` | Run validation in CI | All tests pass |
|
||||
|
||||
## Execution Log
|
||||
|
||||
| Date (UTC) | Update | Owner |
|
||||
|------------|--------|-------|
|
||||
| 2026-01-13 | Sprint created from advisory analysis. | Project Mgmt |
|
||||
| 2026-01-13 | Marked corpus tasks blocked pending confirmed package sources, hashes, and artifacts. | Tools |
|
||||
|
||||
## Decisions & Risks
|
||||
|
||||
- **APPROVED**: Start with ELF only; PrintNightmare conditional on PE support.
|
||||
- **APPROVED**: Use Debian snapshot archive for reproducible sudo packages.
|
||||
- **RISK**: Kernel binaries are very large; consider extracting specific .ko modules.
|
||||
- **RISK**: Package removal from archives; cache locally after first fetch.
|
||||
- **BLOCKER**: Requires confirmed package URLs, hashes, and binaries before metadata and corpus can be generated.
|
||||
|
||||
## Next Checkpoints
|
||||
|
||||
- Task 1-4 complete -> Dirty Pipe pair validated
|
||||
- Task 5-8 complete -> Baron Samedit pair validated
|
||||
- Task 10-12 complete -> Corpus published, CI integrated
|
||||
- Sprint and Batch complete
|
||||
@@ -1,64 +0,0 @@
|
||||
# Sprint 20260113_005_ADVISORYAI_controlled_conversational_interface - Controlled Conversational Interface (AdvisoryAI)
|
||||
|
||||
## Topic & Scope
|
||||
- Add Chat Gateway guardrails (quotas, budgets, scrubber) to the AdvisoryAI chat pipeline.
|
||||
- Enforce sanctioned tool registry (read-only default) with policy checks for tool use.
|
||||
- Persist immutable audit logs for prompts, redactions, tool calls, and model identifiers.
|
||||
- **Working directory:** `src/AdvisoryAI/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on policy tool lattice sprint for allow/deny evaluation.
|
||||
- UI and CLI sprints can proceed in parallel once chat API schema is stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/advisory-ai/architecture.md`
|
||||
- `docs/modules/advisory-ai/chat-interface.md`
|
||||
- `docs/security/assistant-guardrails.md`
|
||||
- `docs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | AIAI-CHAT-DOCS-0001 | DONE | None | Guild - AdvisoryAI | Update `docs/modules/advisory-ai/architecture.md` and `docs/modules/advisory-ai/chat-interface.md` with Chat Gateway guardrails and audit log details. |
|
||||
| 2 | AIAI-CHAT-GW-0001 | DONE | Policy lattice sprint | Guild - AdvisoryAI | Implement Chat Gateway quotas and token budgets with deterministic counters and rejection codes; use settings overrides with env defaults. |
|
||||
| 3 | AIAI-CHAT-SCRUB-0001 | DONE | AIAI-CHAT-GW-0001 | Guild - AdvisoryAI | Add PII/secret scrubber (regex + entropy + allowlist) for input/output with test vectors. |
|
||||
| 4 | AIAI-CHAT-TOOLS-0001 | DONE | Policy lattice sprint | Guild - AdvisoryAI | Implement sanctioned tool registry with schema-bound invocation and read-only defaults; enforce per-tenant allowlist. |
|
||||
| 5 | AIAI-CHAT-AUDIT-0001 | DONE | AIAI-CHAT-TOOLS-0001 | Guild - AdvisoryAI | Persist audit log tables (prompts, tool invocations, policy decisions, evidence links) with content hashes; optional DSSE capture. |
|
||||
| 6 | AIAI-CHAT-PLUGIN-0001 | BLOCKED | AIAI-CHAT-TOOLS-0001 | Guild - AdvisoryAI | Build adapters for `vex.query`, `sbom.read`, and `scanner.findings.topk`. |
|
||||
| 7 | AIAI-CHAT-TEST-0001 | BLOCKED | AIAI-CHAT-AUDIT-0001 | Guild - AdvisoryAI | Add integration tests for quotas, scrubber blocks, policy denies, and audit log persistence. |
|
||||
| 8 | AIAI-CHAT-SETTINGS-0001 | DONE | AIAI-CHAT-GW-0001 | Guild - AdvisoryAI | Add chat settings store and API for quota/allowlist overrides (UI/CLI), with env defaults. |
|
||||
| 9 | AIAI-CHAT-DOCTOR-0001 | DONE | AIAI-CHAT-SETTINGS-0001 | Guild - AdvisoryAI | Add chat doctor endpoint to diagnose quota/tool limitations and last deny reasons. |
|
||||
| 10 | AIAI-CHAT-ENDPOINTS-0002 | DONE | None | Guild - AdvisoryAI | Fix chat endpoints: register determinism GUID provider, allow role-based auth headers, and add SSE streaming for conversation turns. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created from controlled conversational interface advisory; docs updated. | Product Mgmt |
|
||||
| 2026-01-13 | Added settings/doctor tasks for quota and allowlist overrides. | Product Mgmt |
|
||||
| 2026-01-13 | Started AIAI-CHAT-GW-0001, AIAI-CHAT-TOOLS-0001, AIAI-CHAT-SETTINGS-0001, AIAI-CHAT-DOCTOR-0001. | AdvisoryAI |
|
||||
| 2026-01-13 | Completed AIAI-CHAT-GW-0001, AIAI-CHAT-TOOLS-0001, AIAI-CHAT-SETTINGS-0001, AIAI-CHAT-DOCTOR-0001; tests blocked by `src/__Libraries/StellaOps.TestKit/Connectors/ConnectorHttpFixture.cs` compile error (IServiceProvider missing Dispose). | AdvisoryAI |
|
||||
| 2026-01-13 | Marked remaining AdvisoryAI tasks blocked to avoid conflicting parallel changes; pending ownership handoff. | AdvisoryAI |
|
||||
| 2026-01-13 | Fixed chat endpoint binding/auth/streaming (AIAI-CHAT-ENDPOINTS-0002); tests run with `dotnet test --no-build` due to external build failure in `src/Router/__Libraries/StellaOps.Microservice/ServiceCollectionExtensions.cs`. | AdvisoryAI |
|
||||
| 2026-01-13 | Cleared duplicate `using` in `src/Router/__Libraries/StellaOps.Microservice/ServiceCollectionExtensions.cs`; `dotnet build` now succeeds. | AdvisoryAI |
|
||||
| 2026-01-13 | Resumed AIAI-CHAT-SCRUB-0001 for entropy/allowlist scrubber updates. | AdvisoryAI |
|
||||
| 2026-01-13 | Completed AIAI-CHAT-SCRUB-0001; tuned guardrail redaction pre-checks and performance scenarios; AdvisoryAI tests pass. | AdvisoryAI |
|
||||
| 2026-01-13 | Started AIAI-CHAT-AUDIT-0001 for chat audit persistence. | AdvisoryAI |
|
||||
| 2026-01-13 | Completed AIAI-CHAT-AUDIT-0001; added Postgres audit logger + migration, docs, and tests; ran `dotnet test src/AdvisoryAI/__Tests/StellaOps.AdvisoryAI.Tests/StellaOps.AdvisoryAI.Tests.csproj -v minimal`. | AdvisoryAI |
|
||||
| 2026-01-13 | Reaffirmed UI/CLI settings overrides (env defaults) and doctor action expectations in assistant-parameters guidance. | AdvisoryAI |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: Use existing conversation storage and chat endpoints as the base; extend with Chat Gateway controls.
|
||||
- Decision: Guardrail and audit expectations are captured in `docs/modules/advisory-ai/chat-interface.md` and `docs/security/assistant-guardrails.md`.
|
||||
- Decision: Quotas and tool allowlists are configurable via UI/CLI settings with env defaults.
|
||||
- Decision: Chat endpoints accept scopes or role headers (`chat:user`, `chat:admin`) for authorization.
|
||||
- Risk: Tool schemas may shift across modules; require a shared contract before enabling more tools.
|
||||
- Risk: Settings persistence needs Postgres-backed store; in-memory defaults are not durable.
|
||||
- Risk: Audit log storage growth; define retention windows and offline export procedures.
|
||||
- Risk: Full build previously failed due to duplicate using in `src/Router/__Libraries/StellaOps.Microservice/ServiceCollectionExtensions.cs`; resolved locally, re-run baseline builds as needed.
|
||||
|
||||
## Next Checkpoints
|
||||
- API schema review for tool invocation and audit log payloads.
|
||||
- Guardrail test vectors approved by Security Guild.
|
||||
- Demo: read-only advisor flow with citations.
|
||||
@@ -1,47 +0,0 @@
|
||||
# Sprint 20260113_005_CLI_advise_chat - Advise Chat CLI
|
||||
|
||||
## Topic & Scope
|
||||
- Add `stella advise ask` for controlled conversational queries with evidence refs.
|
||||
- Default to read-only output; expose flags for evidence and action suppression.
|
||||
- Align output with Advisor UI evidence chips and citations.
|
||||
- **Working directory:** `src/Cli/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on AdvisoryAI chat API schema and policy tool lattice decisions.
|
||||
- Can run in parallel with UI once API contracts are stable.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/modules/cli/architecture.md`
|
||||
- `docs/modules/advisory-ai/chat-interface.md`
|
||||
- `docs/security/assistant-guardrails.md`
|
||||
- `docs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | CLI-CHAT-DOCS-0001 | DONE | None | Guild - CLI | Update `docs/modules/cli/architecture.md` with `advise ask` command details. |
|
||||
| 2 | CLI-CHAT-CMD-0001 | BLOCKED | AdvisoryAI chat API | Guild - CLI | Add `advise ask` command and route to chat query endpoint. |
|
||||
| 3 | CLI-CHAT-FLAGS-0001 | BLOCKED | CLI-CHAT-CMD-0001 | Guild - CLI | Implement `--no-action` and `--evidence` flags with safe defaults. |
|
||||
| 4 | CLI-CHAT-OUTPUT-0001 | BLOCKED | CLI-CHAT-CMD-0001 | Guild - CLI | Render citations and evidence refs in JSON and table output. |
|
||||
| 5 | CLI-CHAT-TEST-0001 | BLOCKED | CLI-CHAT-CMD-0001 | Guild - CLI | Add unit tests for flags, output formats, and policy deny handling. |
|
||||
| 6 | CLI-CHAT-SETTINGS-0001 | BLOCKED | AdvisoryAI settings API | Guild - CLI | Add `advise settings` for chat quotas/allowlist overrides. |
|
||||
| 7 | CLI-CHAT-DOCTOR-0001 | BLOCKED | AdvisoryAI doctor API | Guild - CLI | Add `advise doctor` to show chat quota/tool limitations. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created from controlled conversational interface advisory; docs updated. | Product Mgmt |
|
||||
| 2026-01-13 | Added settings and doctor tasks for quota/allowlist overrides. | Product Mgmt |
|
||||
| 2026-01-13 | Marked CLI advise tasks blocked pending AdvisoryAI API stability and parallel module ownership. | CLI |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: Default to read-only responses; action suppression is explicit.
|
||||
- Decision: CLI command details documented in `docs/modules/cli/architecture.md`.
|
||||
- Risk: Long responses may exceed token budgets; keep output truncation deterministic.
|
||||
- Risk: Settings updates require scope-gated access; align with Authority scopes.
|
||||
- BLOCKED: AdvisoryAI chat/settings/doctor APIs pending stable contract and active parallel changes.
|
||||
|
||||
## Next Checkpoints
|
||||
- CLI UX review for evidence output format.
|
||||
- API contract validation for chat queries and error codes.
|
||||
@@ -1,43 +0,0 @@
|
||||
# Sprint 20260113_005_DOCS_controlled_conversational_interface - Controlled Conversational Interface Docs
|
||||
|
||||
## Topic & Scope
|
||||
- Capture the controlled conversational interface advisory and archive it for long-term reference.
|
||||
- Update high-level docs to reflect the evidence-first advisor capability and cross-links.
|
||||
- Extend guardrail and assistant parameter docs to cover quotas, scrubber, and tool gating.
|
||||
- **Working directory:** `docs/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- No upstream dependencies; doc updates can run in parallel with implementation sprints.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
- `docs/security/assistant-guardrails.md`
|
||||
- `docs/modules/policy/guides/assistant-parameters.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCS-CCI-0001 | DONE | None | Guild - Docs | Create and archive the advisory: `docs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md`. |
|
||||
| 2 | DOCS-CCI-0002 | DONE | DOCS-CCI-0001 | Guild - Docs | Update `docs/key-features.md`, `docs/ARCHITECTURE_OVERVIEW.md`, and add `docs/07_HIGH_LEVEL_ARCHITECTURE.md` references. |
|
||||
| 3 | DOCS-CCI-0003 | DONE | DOCS-CCI-0001 | Guild - Docs | Update `docs/security/assistant-guardrails.md` for scrubber, budgets, and audit trail notes. |
|
||||
| 4 | DOCS-CCI-0004 | DONE | DOCS-CCI-0001 | Guild - Docs | Update `docs/modules/policy/guides/assistant-parameters.md` with chat quotas and tool gating. |
|
||||
| 5 | DOCS-CCI-0005 | DONE | DOCS-CCI-0001 | Guild - Docs | Update module AGENTS to reflect advisor guardrails (`docs/modules/advisory-ai/AGENTS.md`, `docs/modules/ui/AGENTS.md`, `docs/modules/cli/AGENTS.md`, `docs/modules/policy/AGENTS.md`). |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created from controlled conversational interface advisory; doc updates completed and advisory archived. | Product Mgmt |
|
||||
| 2026-01-13 | Updated AdvisoryAI, UI, CLI, and Policy AGENTS to reflect advisor guardrails. | Docs |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: Use `docs/ARCHITECTURE_OVERVIEW.md` as the canonical high-level doc; add `docs/07_HIGH_LEVEL_ARCHITECTURE.md` as a legacy pointer.
|
||||
- Decision: AGENTS updates recorded in this sprint to keep module guardrails aligned.
|
||||
- Risk: Links to archived advisories must be maintained for traceability; validate docs links after merges.
|
||||
- Risk: `docs/implplan/SPRINT_0301_0001_0001_docs_md_i.md` is referenced in `docs/AGENTS.md` but is not present in the repo.
|
||||
- Risk: `docs/implplan/archived/all-tasks.md` referenced by advisory workflow is missing; historical task cross-check was limited.
|
||||
|
||||
## Next Checkpoints
|
||||
- Docs Guild review of updated advisory, guardrail, and parameter docs.
|
||||
- Link validation sweep for docs references.
|
||||
@@ -1,69 +0,0 @@
|
||||
# Sprint 20260113-005-DOCTOR · Orchestrator Doctor Self Service
|
||||
|
||||
## Topic & Scope
|
||||
- Define Doctor packs for Release Orchestrator integrations with deterministic checks and verbatim fix commands.
|
||||
- Add JSONL evidence logs and optional DSSE summaries for audit-grade Doctor runs.
|
||||
- Align CLI and UI with a shared `how_to_fix` command contract for self-service remediation.
|
||||
- Expected evidence: updated specs in `docs/doctor/doctor-capabilities.md`, updated module doc in `docs/modules/release-orchestrator/modules/integration-hub.md`, and sample manifest in `docs/benchmarks/doctor/doctor-plugin-release-orchestrator-gitlab.yaml`.
|
||||
- **Working directory:** `src/Doctor`.
|
||||
- **Allowed cross-module paths:** `src/__Libraries/StellaOps.Doctor/**`, `src/Cli/**`, `src/Web/**`, `src/ReleaseOrchestrator/**`, `plugins/doctor/**`, `samples/**`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on Doctor engine/library and CLI command group integration.
|
||||
- No known conflicts with other 20260113 sprints; safe to run in parallel with CC peers.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/technical/architecture/07_HIGH_LEVEL_ARCHITECTURE.md`
|
||||
- `docs/modules/release-orchestrator/architecture.md`
|
||||
- `docs/modules/release-orchestrator/modules/integration-hub.md`
|
||||
- `docs/doctor/doctor-capabilities.md`
|
||||
- `docs/modules/platform/architecture-overview.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | DOCS-DR-0001 | DONE | Advisory sync | Product · Docs | Sync Doctor advisory into docs and add sample manifest (`docs-archived/product/advisories/13-Jan-2026 - Release Orchestrator Doctor Self Service.md`, `docs/doctor/doctor-capabilities.md`, `docs/modules/release-orchestrator/modules/integration-hub.md`, `docs/key-features.md`, `docs/benchmarks/doctor/doctor-plugin-release-orchestrator-gitlab.yaml`). |
|
||||
| 2 | DOCTOR-DR-0002 | DONE | Pack schema + loader | Backend · Doctor | Implement YAML pack loader for `plugins/doctor/*.yaml` with discovery gating, exec runner, and parse expectations. |
|
||||
| 2.1 | AGENTS-DOCTOR-0001 | DONE | Module charter | Project · Doctor | Create `src/Doctor/AGENTS.md` with module constraints, test strategy, and allowed shared libs. |
|
||||
| 3 | PACKS-DR-0003 | DONE | DOCTOR-DR-0002 | Backend · Doctor | Add first-party Doctor packs for GitLab, GitHub, Gitea, Harbor/OCI, Vault, LDAP under `plugins/doctor/`. |
|
||||
| 4 | CLI-DR-0004 | DONE | DOCTOR-DR-0002 | CLI · Platform | Add `stella doctor run` alias and `stella doctor fix` pipeline with dry-run by default and `--apply` gating. |
|
||||
| 5 | ORCH-DR-0005 | BLOCKED | DOCTOR-DR-0002 | Backend · Release Orchestrator | Implement orchestrator checks for webhooks, branch policy, registry push/pull, SBOM ingestion, vault, LDAP, migrations, and policy pack verification. |
|
||||
| 6 | DOCTOR-DR-0006 | DONE | DOCTOR-DR-0002 | Backend · Doctor | Emit JSONL evidence logs and optional DSSE summaries with deterministic ordering and offline-safe defaults. |
|
||||
| 7 | UI-DR-0007 | DONE | DOCTOR-DR-0002 | Frontend · Web | Build Doctor UI page with packs -> plugins -> checks, copy fix commands, run fix gating, and JSON/DSSE export. |
|
||||
| 8 | SAMPLES-DR-0008 | DONE | None | Docs · QA | Add sample SBOMs (CycloneDX 1.6 and SPDX 3.0.1) under `samples/` for ingestion tests. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created; advisory synced into docs and sample manifest added. | Product |
|
||||
| 2026-01-13 | Recorded fix exposure, non-destructive execution, and DSSE command note decisions in docs. | Product |
|
||||
| 2026-01-13 | Added `src/Doctor/AGENTS.md`, updated scope to allow cross-module edits, and started DOCTOR-DR-0002. | Implementer |
|
||||
| 2026-01-13 | Implemented YAML pack loader, exec runner, parse expectations, and unit tests. | Implementer |
|
||||
| 2026-01-13 | Added first-party Doctor packs for GitLab, GitHub, Gitea, Harbor, Vault, and LDAP. | Implementer |
|
||||
| 2026-01-13 | Added sample CycloneDX 1.6 and SPDX 3.0.1 SBOMs under `samples/`. | Implementer |
|
||||
| 2026-01-13 | Started DOCTOR-DR-0006 evidence log and DSSE summary output. | Implementer |
|
||||
| 2026-01-13 | Completed DOCTOR-DR-0006 evidence log and DSSE summary output. | Implementer |
|
||||
| 2026-01-13 | Marked CLI/UI/orchestrator tasks blocked pending parallel module ownership. | Implementer |
|
||||
| 2026-01-13 | Started CLI-DR-0004 (doctor run alias and doctor fix pipeline). | Implementer |
|
||||
| 2026-01-13 | Completed CLI-DR-0004; added doctor fix command and run alias. | Implementer |
|
||||
| 2026-01-13 | Tests: `dotnet test src/Cli/__Tests/StellaOps.Cli.Tests` failed due to existing compile errors in `src/Cli/StellaOps.Cli/Commands/Scan/BinaryDiffRenderer.cs`, `src/Cli/StellaOps.Cli/Commands/CommandHandlers.Image.cs`, and `src/Cli/StellaOps.Cli/Commands/CommandHandlers.VerdictVerify.cs`. | Implementer |
|
||||
| 2026-01-13 | Fixed CLI compile errors in `src/Cli/StellaOps.Cli/Commands/Scan/BinaryDiffRenderer.cs`, `src/Cli/StellaOps.Cli/Commands/CommandHandlers.Image.cs`, `src/Cli/StellaOps.Cli/Commands/Scan/BinaryDiffKeyLoader.cs`, and `src/Cli/StellaOps.Cli/Commands/Scan/BinaryDiffService.cs`. | Implementer |
|
||||
| 2026-01-13 | Tests: `dotnet test src/Cli/__Tests/StellaOps.Cli.Tests -v minimal` failed with MSB9008 warning (missing `StellaOps.Scanner.Storage.Oci.csproj`) and CS2012 file lock on `src/Cli/__Tests/StellaOps.Cli.Tests/obj/Debug/net10.0/StellaOps.Cli.Tests.dll`. | Implementer |
|
||||
| 2026-01-13 | Tests: rerun with custom `BaseIntermediateOutputPath` failed with duplicate assembly attribute errors in `src/__Libraries/StellaOps.Infrastructure.EfCore` (CS0579). | Implementer |
|
||||
| 2026-01-13 | Fixed DSSE PAE usage in offline import test and routed JSON output to Console.Out for stable JSON; tests: `dotnet test src/Cli/__Tests/StellaOps.Cli.Tests -v minimal` (pass). | Implementer |
|
||||
| 2026-01-13 | Started UI-DR-0007 (Doctor pack list, fix gating, DSSE export). | Implementer |
|
||||
| 2026-01-13 | Completed UI-DR-0007; tests: `npx ng test --watch=false --include "src/app/features/doctor/**/*.spec.ts"` failed due to pre-existing TS errors in advisory-ai, vex-hub, policy, and shared component specs. | Implementer |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: UI and CLI must expose fix actions; CLI uses `stella doctor fix` and UI mirrors commands. See `docs/doctor/doctor-capabilities.md` and `docs/doctor/cli-reference.md`.
|
||||
- Decision: Remediation UX should favor concise copy/paste commands; `how_to_fix` is the agent-facing alias of `remediation`. See `docs/doctor/doctor-capabilities.md` and `docs/modules/release-orchestrator/modules/integration-hub.md`.
|
||||
- Decision: Doctor fix executes only non-destructive commands; destructive steps are manual and never executed by Doctor. See `docs/doctor/doctor-capabilities.md`.
|
||||
- Decision: DSSE summaries include `doctor_command` and assume operator execution. See `docs/doctor/doctor-capabilities.md` and `docs/modules/release-orchestrator/modules/integration-hub.md`.
|
||||
- Risk: Pack execution safety. YAML packs execute CLI commands and must be sandboxed/allowlisted to avoid unsafe actions.
|
||||
- Risk: DSSE signing flow. Define signer/key ownership and offline key distribution for Doctor summary artifacts.
|
||||
- BLOCKED: UI/Release Orchestrator tasks paused to avoid conflicts with parallel work in those modules.
|
||||
|
||||
## Next Checkpoints
|
||||
- 2026-01-20: Design review for pack schema, CLI contract, and UI wiring.
|
||||
- 2026-01-27: Prototype demo with JSONL evidence log and fix command rendering.
|
||||
@@ -1,46 +0,0 @@
|
||||
# Sprint 20260113_005_POLICY_assistant_tool_lattice - Assistant Tool Lattice
|
||||
|
||||
## Topic & Scope
|
||||
- Define policy lattice rules for assistant tool access (read-only vs action).
|
||||
- Provide a policy evaluation surface for Chat Gateway allow/deny checks.
|
||||
- Align tool access with Authority scopes and tenant constraints.
|
||||
- **Working directory:** `src/Policy/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- AdvisoryAI sprint depends on this policy evaluation for tool gating.
|
||||
- Can run in parallel with UI/CLI work once rule schema is agreed.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/ARCHITECTURE_OVERVIEW.md`
|
||||
- `docs/modules/policy/architecture.md`
|
||||
- `docs/modules/policy/guides/assistant-parameters.md`
|
||||
- `docs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | POL-CHAT-DOCS-0001 | DONE | None | Guild - Policy | Update `docs/modules/policy/guides/assistant-parameters.md` with chat quotas, scrubber, and tool gating settings. |
|
||||
| 2 | POL-CHAT-SCHEMA-0001 | DONE | None | Guild - Policy | Define tool access schema or DSL rules (tool name, scope, tenant, role, resource). |
|
||||
| 3 | POL-CHAT-EVAL-0001 | DONE | POL-CHAT-SCHEMA-0001 | Guild - Policy | Implement policy evaluation endpoint for Chat Gateway allow/deny checks. |
|
||||
| 4 | POL-CHAT-SCOPE-0001 | DONE | POL-CHAT-SCHEMA-0001 | Guild - Policy | Map Authority scopes to tool lattice rules and document default deny behavior. |
|
||||
| 5 | POL-CHAT-TEST-0001 | DONE | POL-CHAT-EVAL-0001 | Guild - Policy | Add determinism and authorization tests for tool lattice evaluation. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created from controlled conversational interface advisory; docs updated. | Product Mgmt |
|
||||
| 2026-01-13 | Noted UI/CLI-configurable allowlist defaults for tool lattice alignment. | Product Mgmt |
|
||||
| 2026-01-13 | Marked remaining policy tasks blocked pending schema decisions and parallel module ownership. | Policy |
|
||||
| 2026-01-13 | Implemented tool lattice schema, evaluator, gateway endpoint, and tests; documented default scope mapping. | Policy |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: Default deny for tool actions; allow read-only tools via explicit rules.
|
||||
- Decision: Tool lattice parameters are documented in `docs/modules/policy/guides/assistant-parameters.md`.
|
||||
- Decision: Tool lattice must align with settings-based allowlists (env defaults, UI/CLI overrides).
|
||||
- Risk: Policy evaluation latency may impact chat UX; ensure caching and deterministic ordering.
|
||||
- Decision: Default scope mapping documented in `docs/modules/policy/guides/assistant-tool-lattice.md`.
|
||||
|
||||
## Next Checkpoints
|
||||
- DSL/schema review with Policy Guild.
|
||||
- Contract review with AdvisoryAI for tool allow/deny payloads.
|
||||
@@ -1,48 +0,0 @@
|
||||
# Sprint 20260113_005_UI_advisor_chat_panel - Advisor Chat Panel
|
||||
|
||||
## Topic & Scope
|
||||
- Deliver the Advisor chat panel with evidence citations and action confirmation.
|
||||
- Provide UI parity for controlled conversational interface (read-only by default).
|
||||
- Surface quota/budget feedback for chat requests.
|
||||
- **Working directory:** `src/Web/StellaOps.Web/`.
|
||||
|
||||
## Dependencies & Concurrency
|
||||
- Depends on AdvisoryAI chat endpoints and tool schema stability.
|
||||
- Can run in parallel with CLI work once API contracts are set.
|
||||
|
||||
## Documentation Prerequisites
|
||||
- `docs/README.md`
|
||||
- `docs/modules/ui/architecture.md`
|
||||
- `docs/modules/advisory-ai/chat-interface.md`
|
||||
- `docs/security/assistant-guardrails.md`
|
||||
- `docs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md`
|
||||
|
||||
## Delivery Tracker
|
||||
| # | Task ID | Status | Key dependency / next step | Owners | Task Definition |
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
| 1 | UI-CHAT-DOCS-0001 | DONE | None | Guild - UI | Update `docs/modules/ui/architecture.md` with Advisor chat panel and evidence drawer notes. |
|
||||
| 2 | UI-CHAT-PANEL-0001 | BLOCKED | AdvisoryAI chat API | Guild - UI | Build chat panel with conversation list, streaming responses, and input controls. |
|
||||
| 3 | UI-CHAT-CITATIONS-0001 | BLOCKED | UI-CHAT-PANEL-0001 | Guild - UI | Implement citations and evidence chips with object ref links. |
|
||||
| 4 | UI-CHAT-ACTIONS-0001 | BLOCKED | Policy tool lattice | Guild - UI | Add action confirmation modal and policy-deny display states. |
|
||||
| 5 | UI-CHAT-QUOTA-0001 | BLOCKED | UI-CHAT-PANEL-0001 | Guild - UI | Surface quota/budget exhaustion and retry hints (doctor output). |
|
||||
| 6 | UI-CHAT-TEST-0001 | BLOCKED | UI-CHAT-PANEL-0001 | Guild - UI | Add unit and e2e coverage for chat panel, citations, and actions. |
|
||||
| 7 | UI-CHAT-SETTINGS-0001 | BLOCKED | AdvisoryAI settings API | Guild - UI | Add settings view for chat quotas and tool allowlist (env defaults + overrides). |
|
||||
| 8 | UI-CHAT-DOCTOR-0001 | BLOCKED | UI-CHAT-PANEL-0001 | Guild - UI | Add doctor action to show chat limit status and last denial reasons. |
|
||||
|
||||
## Execution Log
|
||||
| Date (UTC) | Update | Owner |
|
||||
| --- | --- | --- |
|
||||
| 2026-01-13 | Sprint created from controlled conversational interface advisory; docs updated. | Product Mgmt |
|
||||
| 2026-01-13 | Added settings and doctor tasks for quota/allowlist overrides. | Product Mgmt |
|
||||
| 2026-01-13 | Marked UI chat tasks blocked pending API/tool lattice stability and parallel module ownership. | UI |
|
||||
|
||||
## Decisions & Risks
|
||||
- Decision: Advisor UI defaults to read-only; actions are opt-in and confirmed.
|
||||
- Decision: Advisor UI surface documented in `docs/modules/ui/architecture.md`.
|
||||
- Decision: Settings UI must show env defaults and saved overrides for quotas/allowlist.
|
||||
- Risk: Streaming UI performance; ensure backpressure and log scrubbing on client.
|
||||
- BLOCKED: AdvisoryAI API and policy lattice contracts pending; avoid parallel changes without coordination.
|
||||
|
||||
## Next Checkpoints
|
||||
- UI design review with citations panel mock.
|
||||
- API contract validation for streaming chat events.
|
||||
Reference in New Issue
Block a user