save checkpoint
This commit is contained in:
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Sigstore bundle verification with dedicated verifier and bundler services for validating attestation integrity.
|
||||
@@ -30,3 +30,13 @@ Sigstore bundle verification with dedicated verifier and bundler services for va
|
||||
- [ ] Sign a bundle with `KmsOrgKeySigner` and verify the org-level signature is present in the output
|
||||
- [ ] Run `AttestorVerificationEngine` against a valid bundle and verify all verification checks pass
|
||||
- [ ] Run `AttestorVerificationEngine` against a bundle with an invalid signature and verify it reports the specific check that failed
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Golden test vectors and determinism verification tests ensuring byte-for-byte reproducibility of attestations, DSSE envelopes, and policy engine evaluations.
|
||||
@@ -28,3 +28,13 @@ Golden test vectors and determinism verification tests ensuring byte-for-byte re
|
||||
- [ ] Generate SPDX SBOM output from identical inputs on two separate runs and verify SHA-256 hash match
|
||||
- [ ] Verify golden sample test vectors by comparing generated attestation against known-good fixtures stored in the test project
|
||||
- [ ] Run conformance parity tests to verify Attestor output matches reference implementations for checkpoint parsing, inclusion proofs, and verification
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Integration of RFC 3161 timestamps into the attestation pipeline with TST-Rekor time correlation validation that detects anti-backdating attempts by cross-referencing TST genTime against Rekor integratedTime. Includes CycloneDx/SPDX timestamp extensions and policy-gated timestamping. No direct match in known features list.
|
||||
@@ -28,3 +28,13 @@ Integration of RFC 3161 timestamps into the attestation pipeline with TST-Rekor
|
||||
- [ ] Generate an SPDX SBOM with `SpdxTimestampExtension` and verify the timestamp token is embedded in the output
|
||||
- [ ] Extract timestamps from a CycloneDX document and verify the extracted `genTime` matches the original
|
||||
- [ ] Test `TsaMultiProvider` fallback by simulating primary TSA timeout and verifying secondary provider is used
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Conformance test suite verifying Sigstore/Rekor verification parity against reference implementations. Tests inclusion proof verification, checkpoint parsing, and signature validation against known-good test vectors.
|
||||
@@ -28,3 +28,13 @@ Conformance test suite verifying Sigstore/Rekor verification parity against refe
|
||||
- [ ] Verify `MerkleProofVerifier` validates an inclusion proof with correct sibling hashes and returns the correct root
|
||||
- [ ] Verify `RekorOfflineReceiptVerifier` validates a receipt without network access using embedded inclusion proof
|
||||
- [ ] Run `CheckpointDivergenceDetector` with two checkpoints from different Rekor instances showing divergent trees and verify detection
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Exportable evidence packs (audit bundles) containing RVA attestation, policy bundle, knowledge snapshot manifest, referenced evidence artifacts, and verification replay logs for auditor consumption.
|
||||
@@ -28,3 +28,13 @@ Exportable evidence packs (audit bundles) containing RVA attestation, policy bun
|
||||
- [ ] Tamper with an artifact in the exported pack and verify that digest verification detects the modification
|
||||
- [ ] Archive an evidence pack to S3 via `S3AttestorArchiveStore` and retrieve it, verifying content integrity
|
||||
- [ ] Verify the evidence pack includes all required audit artifacts (attestation chain, policy bundle, knowledge snapshot)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full audit pack export system with verdict replay attestation, evidence bundling, and export center with timeline integration and scheduling.
|
||||
@@ -29,3 +29,13 @@ Full audit pack export system with verdict replay attestation, evidence bundling
|
||||
- [ ] Test retention policy enforcement by creating a pack older than the retention window and verifying `RetentionPolicyEnforcer` marks it for cleanup
|
||||
- [ ] Archive a pack to S3 and retrieve it, verifying all artifacts are intact and digests match the manifest
|
||||
- [ ] Tamper with a single artifact in the pack and verify integrity validation detects the modification
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
VEX draft generation attestation types for AI-generated VEX statements with justifications, enabling lattice-aware merge preview.
|
||||
@@ -26,3 +26,13 @@ VEX draft generation attestation types for AI-generated VEX statements with just
|
||||
- [ ] Build a `VexOverridePredicate` from an AI-generated draft via `VexOverridePredicateBuilder` and verify the override captures the draft's justification
|
||||
- [ ] Parse a serialized VEX override via `VexOverridePredicateParser` and verify all fields round-trip correctly
|
||||
- [ ] Integrate a VEX draft into the proof chain via `VexProofIntegrator` and verify the proof payload contains the draft evidence
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
BackportProof library in Concelier and multi-tier BackportProofGenerator in Attestor with confidence scoring, evidence combining, and tier-based proof generation (Tier 1 through 4 plus signature variants).
|
||||
@@ -32,3 +32,13 @@ BackportProof library in Concelier and multi-tier BackportProofGenerator in Atte
|
||||
- [ ] Generate a proof for a package with `VulnerableUnknown` status and verify the generator handles it with appropriate uncertainty indicators
|
||||
- [ ] Verify `EvidenceSummary` output contains entries from all applicable tiers with per-tier confidence scores
|
||||
- [ ] Generate proofs for the same package twice and verify deterministic output (same confidence scores and evidence)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Complete BinaryDiff predicate implementation with DSSE signing/verification, schema validation, normalization, and serialization for patch detection attestations.
|
||||
@@ -29,3 +29,13 @@ Complete BinaryDiff predicate implementation with DSSE signing/verification, sch
|
||||
- [ ] Validate a predicate against the JSON schema via `BinaryDiffSchema` and verify it passes
|
||||
- [ ] Create a predicate with section-level diffs (`BinaryDiffSectionModels`) for ELF `.text` and `.rodata` sections and verify section details are preserved
|
||||
- [ ] Create a predicate missing required fields and verify schema validation catches the error
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary diff analysis with DSSE-signed evidence output is implemented. The system compares binaries, produces deterministic diff signatures, serializes predicates, and integrates with VEX evidence linking. While the advisory specifically mentions B2R2 IR lifting, the implemented approach uses binary section-level diffing with DSSE attestation.
|
||||
@@ -30,3 +30,13 @@ Binary diff analysis with DSSE-signed evidence output is implemented. The system
|
||||
- [ ] Generate binary fingerprint evidence via `BinaryFingerprintEvidenceGenerator` from a binary with known vulnerability matches and verify `BinaryVulnMatchInfo` is populated
|
||||
- [ ] Link binary diff evidence to a VEX decision via `VexProofIntegrator` and verify the proof chain includes the diff artifact
|
||||
- [ ] Create diff findings for both ELF and PE section types and verify `BinaryDiffSectionModels` handles both formats
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary fingerprint evidence generation with identity info, vulnerability match info, and micro-witness binary references provides cryptographic evidence for binary reachability claims.
|
||||
@@ -27,3 +27,13 @@ Binary fingerprint evidence generation with identity info, vulnerability match i
|
||||
- [ ] Wrap the micro-witness predicate in `BinaryMicroWitnessStatement` and verify it produces a valid in-toto statement
|
||||
- [ ] Generate evidence for a binary with no vulnerability matches and verify the generator produces an empty/clean evidence set
|
||||
- [ ] Verify `MicroWitnessTooling` captures the analysis tool name and version used to generate the evidence
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Extensive binary fingerprinting with disassembly, delta signatures, fingerprint indexing, and attestable proof generation covering ELF/PE analysis.
|
||||
@@ -26,3 +26,13 @@ Extensive binary fingerprinting with disassembly, delta signatures, fingerprint
|
||||
- [ ] Verify `MicroWitnessFunctionEvidence` links specific functions to their fingerprint evidence
|
||||
- [ ] Run the generator twice on identical inputs and verify deterministic output (same evidence IDs)
|
||||
- [ ] Verify the generated evidence can be embedded in a DSSE-signed attestation via the proof chain signing infrastructure
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary analysis commands exist in the CLI with score gating, confidence calculation is implemented in the Policy engine, and a Doctor plugin for binary analysis health checks exists. A full binary fingerprint database with ELF/PE section hashing, trust scores, and golden set as described is partially implemented through the existing binary analysis infrastructure.
|
||||
@@ -34,3 +34,13 @@ Binary analysis commands exist in the CLI with score gating, confidence calculat
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary fingerprinting infrastructure with two methods: Simplified TLSH (locality-sensitive hashing) and Instruction Hash (normalized instruction sequence hashing). Both are proof-of-concept implementations noted as needing production-grade library integration. BinaryFingerprintEvidenceGenerator creates attestable proof segments from binary vulnerability findings.
|
||||
@@ -26,3 +26,13 @@ Binary fingerprinting infrastructure with two methods: Simplified TLSH (locality
|
||||
- [ ] Verify content-addressed IDs are generated deterministically for identical fingerprint evidence
|
||||
- [ ] Wrap fingerprint evidence in a DSSE-signed attestation and verify the signed envelope contains the correct predicate type
|
||||
- [ ] Generate fingerprint evidence for two versions of the same binary and verify the TLSH hashes differ but remain within expected similarity range
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary fingerprint evidence generation, binary identity and vulnerability matching info, and native binary hardening analysis for PE, ELF, and Mach-O formats.
|
||||
@@ -27,3 +27,13 @@ Binary fingerprint evidence generation, binary identity and vulnerability matchi
|
||||
- [ ] Generate a binary diff between two binary versions and verify section-level changes are captured in `BinaryDiffSectionModels`
|
||||
- [ ] Verify binary fingerprint evidence integrates with SLSA provenance by including binary digests in build materials
|
||||
- [ ] Sign binary SCA evidence as a DSSE attestation and verify the signature covers the complete `BinaryFingerprintEvidencePredicate`
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full binary diff analysis pipeline with schema validation, DSSE-verified predicates, normalization, and fingerprint evidence generation.
|
||||
@@ -31,3 +31,13 @@ Full binary diff analysis pipeline with schema validation, DSSE-verified predica
|
||||
- [ ] Validate a predicate missing required fields and verify schema validation fails with specific error
|
||||
- [ ] Generate fingerprint evidence from a binary diff result and verify it links to the diff attestation
|
||||
- [ ] Feed binary diff evidence into a `BinaryMicroWitnessPredicate` and verify the reachability proof chain includes the diff evidence
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Binary diff predicate builder with DSSE signing/verification, section-level diff models, schema validation, and integration with evidence bundle exporter.
|
||||
@@ -27,3 +27,13 @@ Binary diff predicate builder with DSSE signing/verification, section-level diff
|
||||
- [ ] Create findings with ELF section changes (.text, .plt, .got) and verify `BinaryDiffSectionModels` captures each section
|
||||
- [ ] Verify DI registration via `ServiceCollectionExtensions` resolves all binary diff services correctly
|
||||
- [ ] Tamper with the DSSE envelope and verify `BinaryDiffDsseVerifier` rejects it
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Build attestation mapping to/from SPDX 3.0.1 is implemented with bidirectional mappers, build material, metadata, and invocation models.
|
||||
@@ -32,3 +32,13 @@ Build attestation mapping to/from SPDX 3.0.1 is implemented with bidirectional m
|
||||
- [ ] Use `BuildRelationshipBuilder` to link build elements and verify SPDX relationships are correctly typed
|
||||
- [ ] Sign a build profile via `DsseSpdx3Signer.SignBuildProfile` and verify the DSSE envelope is valid
|
||||
- [ ] Build a combined SPDX document with SBOM + build attestation profile via `CombinedDocumentBuilder` and verify both profiles are present
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Multi-language call-stack reachability analysis with symbol matching and canonicalization supporting .NET, Java, native (ELF), and scripting languages, plus benchmarking infrastructure with ground-truth validation.
|
||||
@@ -28,3 +28,13 @@ Multi-language call-stack reachability analysis with symbol matching and canonic
|
||||
- [ ] Verify `WitnessGateInfo` correctly captures policy gate thresholds for reachability evidence
|
||||
- [ ] Create `MicroWitnessFunctionEvidence` linking a specific function to call-stack evidence and verify the reference chain
|
||||
- [ ] Wrap a reachability witness in an in-toto statement and verify the predicate type matches `PathWitnessPredicateTypes`
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Deterministic Merkle tree builder, content-addressed IDs, and canonical JSON serialization produce same-inputs-same-output verdicts with verifiable digests.
|
||||
@@ -27,3 +27,13 @@ Deterministic Merkle tree builder, content-addressed IDs, and canonical JSON ser
|
||||
- [ ] Canonicalize a JSON object with out-of-order keys via `Rfc8785JsonCanonicalizer` and verify key ordering matches RFC 8785
|
||||
- [ ] Create a `VerdictReceiptPayload` from identical inputs twice and verify the serialized output is byte-for-byte identical
|
||||
- [ ] Build a `GraphRevisionId` from a proof graph state and verify it changes when graph content changes
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
RFC 8785 JSON canonicalization, deterministic Merkle tree building, and content-addressed ID generation for all proof chain artifacts ensuring stable hashing.
|
||||
@@ -32,3 +32,13 @@ RFC 8785 JSON canonicalization, deterministic Merkle tree building, and content-
|
||||
- [ ] Canonicalize an SBOM document via `SbomCanonicalizer` and verify element ordering is deterministic
|
||||
- [ ] Build a Merkle tree from canonicalized artifacts and verify the root hash is stable across invocations
|
||||
- [ ] Generate `SbomEntryId` for identical SBOM component content and verify ID equality
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed identifiers are implemented for proof chain artifacts. EvidenceLocker provides bundle building. Full OCI/MinIO CAS for SBOM/VEX blobs is not fully visible.
|
||||
@@ -35,3 +35,13 @@ Content-addressed identifiers are implemented for proof chain artifacts. Evidenc
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Checkpoint divergence detection and alert publishing for Rekor transparency log verification.
|
||||
@@ -27,3 +27,13 @@ Checkpoint divergence detection and alert publishing for Rekor transparency log
|
||||
- [ ] Store checkpoints via `PostgresRekorCheckpointStore` and retrieve them, verifying data integrity
|
||||
- [ ] Verify `TimeSkewValidator` detects unacceptable time skew between checkpoint timestamps
|
||||
- [ ] Run `RekorSyncBackgroundService` and verify it periodically fetches and stores new checkpoints
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Quantifiable confidence scoring (0.0-0.98) for backport detection. Uses highest individual tier confidence as base, adds multi-source bonus (0.05 for 2 sources, 0.08 for 3, 0.10 for 4+), capped at 0.98. Per-tier confidence values: DistroAdvisory=0.98, VersionComparison=0.95, BuildCatalog=0.90, PatchHeader=0.85, ChangelogMention=0.80, BinaryFingerprint=0.70.
|
||||
@@ -30,3 +30,13 @@ Quantifiable confidence scoring (0.0-0.98) for backport detection. Uses highest
|
||||
- [ ] Combine evidence from 3 sources and verify bonus of 0.08 is applied
|
||||
- [ ] Combine evidence from 4+ sources and verify bonus of 0.10 is applied, with final score capped at 0.98
|
||||
- [ ] Verify `EvidenceSummary` contains per-tier breakdown showing individual and combined confidence scores
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full content-addressed ID system with types for ArtifactId, EvidenceId, ReasoningId, VexVerdictId, ProofBundleId, plus a content-addressed ID generator and SHA256 parser.
|
||||
@@ -34,3 +34,13 @@ Full content-addressed ID system with types for ArtifactId, EvidenceId, Reasonin
|
||||
- [ ] Generate `EvidenceId`, `ProofBundleId`, `VexVerdictId`, `ReasoningId` for same content and verify they produce the same hash but are distinct types
|
||||
- [ ] Generate a `GraphRevisionId` from a proof graph state, modify the graph, regenerate, and verify the ID changes
|
||||
- [ ] Verify `SbomEntryId` produces deterministic IDs for identical SBOM component content
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed ID generator with SBOM entry IDs and CycloneDX subject extraction for deterministic component referencing.
|
||||
@@ -25,3 +25,13 @@ Content-addressed ID generator with SBOM entry IDs and CycloneDX subject extract
|
||||
- [ ] Extract SPDX component references via `ComponentRefExtractor.Spdx` and verify deterministic SPDX IDs
|
||||
- [ ] Canonicalize an SBOM via `SbomCanonicalizer`, generate content-addressed IDs, and verify stability across invocations
|
||||
- [ ] Modify a single component field and verify the `SbomEntryId` changes
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed NodeId and EdgeId records with graph-aware ID generation, addressing the advisory's EdgeId gap.
|
||||
@@ -29,3 +29,13 @@ Content-addressed NodeId and EdgeId records with graph-aware ID generation, addr
|
||||
- [ ] Modify node payload and verify the node ID changes
|
||||
- [ ] Compute `GraphRevisionId` for a graph state, add a node, recompute, and verify the revision ID changes
|
||||
- [ ] Extract a subgraph via `InMemoryProofGraphService.Subgraph` and verify all node/edge IDs in the subgraph are content-addressed
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Cross-attestation linking via in-toto layout references with link types (DependsOn/Supersedes/Aggregates), DAG validation with cycle detection, chain query API (GET /attestations?chain=true, upstream/downstream traversal with depth limit), and chain visualization endpoint supporting Mermaid/DOT/JSON formats.
|
||||
@@ -29,3 +29,13 @@ Cross-attestation linking via in-toto layout references with link types (Depends
|
||||
- [ ] Resolve downstream links from an SBOM attestation and verify VEX and Policy are returned
|
||||
- [ ] Query chain via `ChainController` GET endpoint with `chain=true` and verify the response contains the full chain
|
||||
- [ ] Request chain visualization in Mermaid format and verify valid Mermaid diagram output
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
SigningKeyProfile supports crypto-sovereign configurations. SM2 tests exist for Chinese crypto support. The signing key registry supports multiple profiles. Full eIDAS/GOST/PQC implementations appear to be partially supported through the profile system but not all crypto backends are fully implemented.
|
||||
@@ -42,3 +42,13 @@ The following crypto plugins exist under `src/Cryptography/` with a plugin archi
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Cryptographic proof generation using canonical JSON serialization and SHA-256 hashing. ProofBlobs are tamper-evident with computed hashes that can be verified. Note: The codebase uses SHA-256 through CanonJson utilities. The advisory mentioned BLAKE3-256 as well; the DB schema references BLAKE3-256 in comments but actual code uses SHA-256 via CanonJson.
|
||||
@@ -27,3 +27,13 @@ Cryptographic proof generation using canonical JSON serialization and SHA-256 ha
|
||||
- [ ] Generate an inclusion proof for a specific blob and verify it validates against the root
|
||||
- [ ] Sign a proof blob via `ProofChainSigner` and verify the DSSE envelope contains the correct hash
|
||||
- [ ] Verify a signed proof blob via `ProofChainSigner.Verification` and confirm integrity
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Scanner stack supports CVSS v4.0 scoring, CycloneDX output (with crypto metadata), and SLSA provenance predicate types. The Signer module includes statement builder for SLSA provenance and integration tests.
|
||||
@@ -31,3 +31,13 @@ Scanner stack supports CVSS v4.0 scoring, CycloneDX output (with crypto metadata
|
||||
- [ ] Validate an SLSA predicate missing required fields and verify schema validation reports specific errors
|
||||
- [ ] Map an SLSA provenance to SPDX 3.0.1 build attestation via `BuildAttestationMapper` and verify the mapping preserves build materials
|
||||
- [ ] Verify `StandardPredicateRegistry` returns correct parsers for CycloneDX, SPDX, and SLSA predicate types
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Comprehensive CycloneDX 1.6 and SPDX 3.0.1 parsers and writers supporting all major SBOM elements: components, services, vulnerabilities, crypto, attestation maps, declarations, evidence, formulation, and more. Includes predicate parsers with metadata extraction and validation, SPDX 3.0 build attestation mappers, and CycloneDX VEX normalizer. 40+ partial class files for CycloneDX alone.
|
||||
@@ -39,3 +39,13 @@ Comprehensive CycloneDX 1.6 and SPDX 3.0.1 parsers and writers supporting all ma
|
||||
- [ ] Round-trip test: write CycloneDX -> parse -> write again and verify deterministic output
|
||||
- [ ] Round-trip test: write SPDX -> parse -> write again and verify deterministic output
|
||||
- [ ] Verify license expression parsing for complex SPDX expressions (e.g., `(MIT OR Apache-2.0) AND BSD-3-Clause`)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full delta computation engine with verdict predicates, change trace entries, budget tracking, VEX delta computation, attestation service, and smart diff with trust indicators. Frontend delta-verdict service and models consume the API. Delta-first comparison shows what changed since last trusted point.
|
||||
@@ -30,3 +30,13 @@ Full delta computation engine with verdict predicates, change trace entries, bud
|
||||
- [ ] Verify budget impact tracking in `DeltaVerdictPredicate.Budget` by adding findings that exceed budget thresholds
|
||||
- [ ] Verify `TrustDeltaRecord` captures trust score changes between snapshots
|
||||
- [ ] Wrap delta verdict in `DeltaVerdictStatement` and verify valid in-toto statement output
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed proof graph with typed nodes/edges, subgraph extraction, mutation operations, and content-addressed ID generation for all identifiers (ArtifactId, EvidenceId, ProofBundleId, VexVerdictId, etc.).
|
||||
@@ -28,3 +28,13 @@ Content-addressed proof graph with typed nodes/edges, subgraph extraction, mutat
|
||||
- [ ] Remove a node via mutation and verify all connected edges are also removed
|
||||
- [ ] Compute graph root attestation via `GraphRootAttestor` and verify `GraphRootPredicate` contains the Merkle root of all node IDs
|
||||
- [ ] Add identical content as a node twice and verify deduplication (same content-addressed ID)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Deterministic SBOM canonicalization using full RFC 8785 JSON Canonicalization Scheme with decimal point handling, number serialization, string normalization, and reproducible transforms between SPDX and CycloneDX. Verified by property-based determinism tests.
|
||||
@@ -30,3 +30,13 @@ Deterministic SBOM canonicalization using full RFC 8785 JSON Canonicalization Sc
|
||||
- [ ] Canonicalize JSON with Unicode escapes and verify normalization to shortest UTF-8 representation
|
||||
- [ ] Create two SBOMs with identical content but different component ordering, canonicalize both, and verify identical output
|
||||
- [ ] Verify CycloneDX and SPDX round-trip: parse -> write -> canonicalize produces stable output
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
RFC 8785 (JCS) canonical JSON serializer ensures deterministic, byte-stable verdict serialization for reproducible signing.
|
||||
@@ -28,3 +28,13 @@ RFC 8785 (JCS) canonical JSON serializer ensures deterministic, byte-stable verd
|
||||
- [ ] Serialize a verdict with various data types (strings, numbers, booleans, nulls, arrays, objects) and verify each type follows RFC 8785 rules
|
||||
- [ ] Store a verdict in `VerdictLedgerService` and verify the ledger hash matches the canonical hash
|
||||
- [ ] Canonicalize via `DefaultDsseCanonicalizer` and verify it produces identical output to `Rfc8785JsonCanonicalizer`
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Attestation bundling with configurable options, aggregation abstraction, and Rekor submission queue with retry worker and sync background service.
|
||||
@@ -31,3 +31,13 @@ Attestation bundling with configurable options, aggregation abstraction, and Rek
|
||||
- [ ] Verify `QueueDepthSnapshot` reports correct counts of pending, processing, and completed items
|
||||
- [ ] Publish a verdict attestation via `VerdictRekorPublisher` and verify the Rekor receipt is stored
|
||||
- [ ] Test `ResilientRekorClient` circuit breaker by simulating repeated failures and verifying the circuit opens
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
DSSE envelope creation, signing, verification, and serialization are fully implemented across multiple Attestor libraries. The advisory proposed DSSE signing as part of a batch sweep experiment; the signing infrastructure is production-ready.
|
||||
@@ -32,3 +32,13 @@ DSSE envelope creation, signing, verification, and serialization are fully imple
|
||||
- [ ] Tamper with the payload after signing and verify signature verification fails
|
||||
- [ ] Create an envelope with detached payload reference and verify the reference is correctly maintained
|
||||
- [ ] Sign with multiple keys and verify each signature is independently verifiable
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor (with CLI and Scanner integration)
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
DSSE envelope construction and Rekor submission exist, but no explicit size guardrails (70-100KB heuristic), automatic payload splitting/chunking, or gateway-aware sizing logic is implemented. The architecture stores full attestations internally and uses Rekor for hash-based inclusion proofs. Envelope size awareness exists in EPSS fetcher and delta-sig CLI commands, and bundling/queue options have configurable size limits.
|
||||
@@ -50,3 +50,13 @@ DSSE envelope construction and Rekor submission exist, but no explicit size guar
|
||||
- `attestor/dsse-envelope-size-awareness.md` (deleted)
|
||||
- `attestor/rekor-envelope-size-guardrails.md` (deleted)
|
||||
- `cli/dsse-envelope-size-management.md` (deleted)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Comprehensive DSSE signing implementation across ProofChain, Envelope, and Spdx3 libraries with verification, pre-authentication encoding, and determinism tests.
|
||||
@@ -26,3 +26,13 @@ Comprehensive DSSE signing implementation across ProofChain, Envelope, and Spdx3
|
||||
- [ ] Verify each signed artifact type with its corresponding verifier
|
||||
- [ ] Test determinism: sign the same payload twice and verify the PAE bytes are identical
|
||||
- [ ] Verify cross-library compatibility: create an envelope with `EnvelopeSignatureService`, verify with `DsseVerifier`
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full DSSE envelope signing service supporting ECDSA P-256, Ed25519, and RSA-PSS. Includes in-toto predicate types for proof chains, SPDX3 build attestations, and verification workflows.
|
||||
@@ -29,3 +29,13 @@ Full DSSE envelope signing service supporting ECDSA P-256, Ed25519, and RSA-PSS.
|
||||
- [ ] Sign an SPDX3 build attestation via `DsseSpdx3Signer` and verify
|
||||
- [ ] Sign a verification report via `DsseVerificationReportSigner` and verify the signed report
|
||||
- [ ] Run golden tests to verify signed attestation output matches known-good test vectors
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
DSSE envelope signing and verification across the pipeline. Scanner emits policy decision and human approval attestations; Attestor ProofChain provides DSSE envelope/signature models and verification.
|
||||
@@ -27,3 +27,13 @@ DSSE envelope signing and verification across the pipeline. Scanner emits policy
|
||||
- [ ] Process a `ProofChainRequest` through the pipeline and verify a `ProofChainResult` is produced with Rekor entry
|
||||
- [ ] Verify the Merkle tree root of the spine matches recomputation from individual event hashes
|
||||
- [ ] Build in-toto statements for each pipeline event via `StatementBuilder` and verify correct predicate types
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Policy exceptions framework with models, repositories, and services exists. DSSE signing infrastructure is available. Full UI exception modal with recheck policy enforcement is partially complete.
|
||||
@@ -34,3 +34,13 @@ Policy exceptions framework with models, repositories, and services exists. DSSE
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Reachability witness payloads with path information and witness statements, plus path witness predicate type definitions.
|
||||
@@ -25,3 +25,13 @@ Reachability witness payloads with path information and witness statements, plus
|
||||
- [ ] Create path witnesses with different `PathWitnessPredicateTypes` and verify correct predicate type URIs
|
||||
- [ ] Verify `WitnessEvidenceMetadata` captures the analysis tool that generated the path
|
||||
- [ ] Create a path witness with `WitnessGateInfo` specifying policy thresholds and verify it serializes correctly
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Rich graphs and suppression witnesses exist with signing infrastructure available, but a specific "signed reach-map artifact" as a standalone DSSE-wrapped output is not distinctly implemented as described.
|
||||
@@ -33,3 +33,13 @@ Rich graphs and suppression witnesses exist with signing infrastructure availabl
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Durable Rekor submission queue with backend support, submission responses, and entry event tracking.
|
||||
@@ -28,3 +28,13 @@ Durable Rekor submission queue with backend support, submission responses, and e
|
||||
- [ ] Verify items exceeding max retries are not retried further
|
||||
- [ ] Verify `RekorEntryEvent` is emitted on each status transition
|
||||
- [ ] Verify queue survives process restart (items persist in PostgreSQL)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Proof graph edge models with typed edges and a rich graph attestation service in Scanner for emitting per-edge attestation data.
|
||||
@@ -27,3 +27,13 @@ Proof graph edge models with typed edges and a rich graph attestation service in
|
||||
- [ ] Attest the full graph root via `GraphRootAttestor` and verify it includes edge count and types
|
||||
- [ ] Remove a node and verify all connected edges are cleaned up
|
||||
- [ ] Extract a subgraph and verify only edges within the subgraph are included
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full Rekor proof builder with build, validate, and inclusion proof types for transparency log verification.
|
||||
@@ -30,3 +30,13 @@ Full Rekor proof builder with build, validate, and inclusion proof types for tra
|
||||
- [ ] Run `RekorInclusionVerificationStep` in the verification pipeline and verify it passes for valid entries
|
||||
- [ ] Tamper with the inclusion proof sibling hashes and verify verification fails
|
||||
- [ ] Run conformance parity tests to verify inclusion proof verification matches reference implementation
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Enhanced Rekor proof persistence storing checkpoint signatures, checkpoint notes, entry body hashes, and verification timestamps for complete offline verification without Rekor connectivity.
|
||||
@@ -29,3 +29,13 @@ Enhanced Rekor proof persistence storing checkpoint signatures, checkpoint notes
|
||||
- [ ] Verify a Rekor receipt offline using `RekorOfflineReceiptVerifier` with only persisted data (no network)
|
||||
- [ ] Persist a spine entity and verify it links to its constituent proof entries
|
||||
- [ ] Verify `ProofChainDbContext` migrations create correct schema with all required tables and indexes
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Score receipts and determinization system provide evidence trails with canonical input hashes, transform IDs, and policy digests. The ProofChain library supports full evidence chain construction.
|
||||
@@ -28,3 +28,13 @@ Score receipts and determinization system provide evidence trails with canonical
|
||||
- [ ] Replay a score using the `VerdictReceiptPayload` (same inputs + same policy) and verify identical output
|
||||
- [ ] Link evidence, reasoning, and verdict nodes in the proof graph and verify the path is traversable
|
||||
- [ ] Generate an `EvidenceSummary` from multiple evidence sources and verify per-source scores are captured
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The concept of gating AI output behind evidence quality exists via the AIAuthorityClassifier which scores explanation, remediation, VEX draft, and policy draft quality. The specific UX badge component and coverage scoring service described in the advisory are not implemented as standalone features.
|
||||
@@ -35,3 +35,13 @@ The concept of gating AI output behind evidence quality exists via the AIAuthori
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
All security findings are wrapped in DSSE envelopes; SmartDiff results are attested as delta verdicts and published to OCI registries.
|
||||
@@ -29,3 +29,13 @@ All security findings are wrapped in DSSE envelopes; SmartDiff results are attes
|
||||
- [ ] Attach a trust verdict to an OCI image via `TrustVerdictOciAttacher` and verify the referrer list includes it
|
||||
- [ ] Fetch the list of attestations for an OCI image via `TrustVerdictOciAttacher.FetchList` and verify all attached attestations are returned
|
||||
- [ ] Verify a retrieved DSSE envelope from OCI validates correctly
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The advisory proposed a ProvenanceChipComponent showing Signed/Verified/Logged states with DSSE envelope viewing and export. The LineageProvenanceChipsComponent implements this concept as a standalone Angular component displaying attestation status, signature verification status, and Rekor transparency log links with expandable details. The backend DSSE and Rekor infrastructure is fully built in the Attestor module.
|
||||
@@ -26,3 +26,13 @@ The advisory proposed a ProvenanceChipComponent showing Signed/Verified/Logged s
|
||||
- [ ] Verify the exported pack contains the DSSE envelope, verification receipt, and Rekor receipt
|
||||
- [ ] Create a `TransparencyWitnessObservation` and verify it captures the observation timestamp and witness identity
|
||||
- [ ] Verify the API endpoint returns provenance chip data consumable by the frontend component
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Backend proof graph model is implemented (nodes, edges, subgraphs, paths). Evidence panel e2e tests exist. Full frontend visualization component status unclear from source search alone.
|
||||
@@ -34,3 +34,13 @@ Backend proof graph model is implemented (nodes, edges, subgraphs, paths). Evide
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Comprehensive evidence type system in ProofChain library and UI evidence panel components covering all listed evidence types.
|
||||
@@ -32,3 +32,13 @@ Comprehensive evidence type system in ProofChain library and UI evidence panel c
|
||||
- [ ] Create a reachability proof via `ReachabilityWitnessStatement` and verify call-stack paths
|
||||
- [ ] Create binary evidence via `BinaryMicroWitnessStatement` with function-level details
|
||||
- [ ] Create uncertainty evidence via `UncertaintyStatement` with budget information
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Proof graph provides the structural backbone linking verdicts to reasoning paths to evidence nodes. Edge explanations in ReachGraph and explainability KPIs in Metrics provide additional layers.
|
||||
@@ -29,3 +29,13 @@ Proof graph provides the structural backbone linking verdicts to reasoning paths
|
||||
- [ ] Verify `ReasoningId` content-addressing: same reasoning content produces the same ID
|
||||
- [ ] Create a `ProofGraphPath` from verdict to evidence and verify path length and node types
|
||||
- [ ] Add a new evidence node to an existing reasoning node and verify the graph updates correctly
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Rekor entry and receipt models exist with structured fields, but a formal field-level ownership map document (checklist page) linking fields to specific module responsibilities was not found as a standalone artifact.
|
||||
@@ -36,3 +36,13 @@ Rekor entry and receipt models exist with structured fields, but a formal field-
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
FixChain provides attestation-based proof that a backport or fix has been applied, with validation and policy gate integration.
|
||||
@@ -30,3 +30,13 @@ FixChain provides attestation-based proof that a backport or fix has been applie
|
||||
- [ ] Verify `FixStatusInfo` in the proof chain tracks fix application status
|
||||
- [ ] Sign the fix chain statement and verify DSSE envelope integrity
|
||||
- [ ] Run integration tests to verify end-to-end fix chain attestation flow
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The described four-layer architecture is realized with distinct modules for edge routing, control plane (policy/authority/attestor/scheduler), evidence plane (scanner/excititor/concelier), and data plane (workers/task runners).
|
||||
@@ -28,3 +28,13 @@ The described four-layer architecture is realized with distinct modules for edge
|
||||
- [ ] Submit a batch of attestations and verify they are queued for Rekor publication
|
||||
- [ ] Verify the background sync service processes queued items
|
||||
- [ ] Verify `AttestorSubmissionValidator` rejects invalid submissions with appropriate error messages
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
A four-tier evidence collection system for backport detection: Tier 1 (Distro Advisories, 0.98 confidence), Tier 2 (Changelog Mentions, 0.80), Tier 3 (Patch Headers + HunkSig, 0.85-0.90), Tier 4 (Binary Fingerprints, 0.55-0.85). BackportProofService orchestrates queries across all tiers and combines evidence into cryptographic ProofBlobs.
|
||||
@@ -33,3 +33,13 @@ A four-tier evidence collection system for backport detection: Tier 1 (Distro Ad
|
||||
- [ ] Run all four tiers and verify `CombineEvidence` produces an aggregated result with multi-source bonus
|
||||
- [ ] Verify the combined evidence is wrapped in a cryptographic `ProofBlob` with valid SHA-256 hash
|
||||
- [ ] Test with a package having no backport evidence across all tiers and verify appropriate `VulnerableUnknown` handling
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Multi-language call graph extraction (binary, Java, Python, Node, PHP, Ruby, JavaScript) is implemented with function-level evidence models (MicroWitness predicates, call path nodes, reachability witness payloads).
|
||||
@@ -31,3 +31,13 @@ Multi-language call graph extraction (binary, Java, Python, Node, PHP, Ruby, Jav
|
||||
- [ ] Create witnesses from multiple language call graphs and verify `MicroWitnessTooling` captures per-language analysis tools
|
||||
- [ ] Verify `MicroWitnessSbomRef` correctly links function evidence to SBOM component entries
|
||||
- [ ] Create `MicroWitnessVerdicts` for multiple functions and verify per-function reachability verdicts
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Graph module has core node/edge model with overlay services, query APIs, and analytics. ProofChain library in Attestor also maintains its own graph node/edge/subgraph types.
|
||||
@@ -29,3 +29,13 @@ Graph module has core node/edge model with overlay services, query APIs, and ana
|
||||
- [ ] Add overlay edges (e.g., cross-linking two evidence nodes) and verify the mutation is reflected in subsequent queries
|
||||
- [ ] Delete a node via `.Mutation` and verify cascading edge removal
|
||||
- [ ] Verify content-addressed node IDs: adding two nodes with identical content produces the same ID
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed graph revision IDs and Merkle root computation are implemented via the GraphRoot library with dedicated attestor, models, and SHA-256-based Merkle root computation.
|
||||
@@ -29,3 +29,13 @@ Content-addressed graph revision IDs and Merkle root computation are implemented
|
||||
- [ ] Compute roots for two different `GraphType` values with the same leaves and verify the roots differ (graph type is included in hashing)
|
||||
- [ ] Recompute a Merkle root from the same inputs and verify it matches the attested value (offline verification)
|
||||
- [ ] Verify the DSSE envelope signature via the verification pipeline
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Service for creating and verifying DSSE-wrapped in-toto attestations of Merkle graph roots. Supports multiple graph types (ResolvedExecutionGraph, ReachabilityGraph, DependencyGraph, ProofSpine, EvidenceGraph) with optional Rekor publication. Enables offline verification by comparing recomputed roots against attested values. Distinct from "Merkle Root Aggregation" and "Graph Revision IDs" which compute roots; this attests them as first-class DSSE-signed entities.
|
||||
@@ -29,3 +29,13 @@ Service for creating and verifying DSSE-wrapped in-toto attestations of Merkle g
|
||||
- [ ] Submit a graph root attestation to Rekor via `RekorSubmissionService` and verify a log entry is created
|
||||
- [ ] Create attestations for two different graph types (e.g., ReachabilityGraph vs DependencyGraph) and verify they produce distinct predicates
|
||||
- [ ] Modify one leaf in the input set, recompute, and verify the attested root no longer matches (tamper detection)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Determinism is enforced and tested at multiple levels: attestation type determinism, DSSE envelope determinism, canonical payload determinism, with dedicated benchmark harness.
|
||||
@@ -28,3 +28,13 @@ Determinism is enforced and tested at multiple levels: attestation type determin
|
||||
- [ ] Create an in-toto statement via `StatementBuilder`, serialize with JCS, re-parse, re-serialize, and verify byte-identical output
|
||||
- [ ] Canonicalize an SBOM via `SbomCanonicalizer` with components in random order and verify the output is sorted deterministically
|
||||
- [ ] Run the determinism benchmark harness and verify zero hash mismatches across 1000+ iterations
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Comprehensive SBOM support with dedicated service, full CycloneDX and SPDX 2.x/3.x parsers and writers, plus UI for SBOM browsing. Extensive coverage of components, vulnerabilities, licensing, relationships, and more.
|
||||
@@ -30,3 +30,13 @@ Comprehensive SBOM support with dedicated service, full CycloneDX and SPDX 2.x/3
|
||||
- [ ] Verify `CycloneDxWriter` handles all CycloneDX 1.6 sections: crypto, formulation, declarations, model cards, attestation maps
|
||||
- [ ] Parse a SLSA provenance predicate via `SlsaProvenancePredicateParser` and verify build materials and builder info are extracted
|
||||
- [ ] Canonicalize an SBOM via `SbomCanonicalizer` and verify deterministic output regardless of input element ordering
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Content-addressed identification for artifacts is implemented. Full idempotent REST API endpoints (POST /sbom/ingest, POST /attest/verify) are not clearly visible as standalone web service endpoints.
|
||||
@@ -35,3 +35,13 @@ Content-addressed identification for artifacts is implemented. Full idempotent R
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
- Related: `scanner/idempotent-attestation-submission.md` (scanner-side submission idempotency)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The underlying evidence storage and proof chain infrastructure exists. Specific regulatory compliance mapping (NIS2, DORA, ISO-27001 report templates) not found as distinct modules.
|
||||
@@ -37,3 +37,13 @@ The underlying evidence storage and proof chain infrastructure exists. Specific
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Complete DSSE/in-toto attestation framework with build provenance, SBOM, scan results, policy evaluation, VEX, risk profile, AI predicates, and more.
|
||||
@@ -41,3 +41,13 @@ Complete DSSE/in-toto attestation framework with build provenance, SBOM, scan re
|
||||
- [ ] Build an `UncertaintyBudgetStatement` and verify it contains budget definitions and violation entries
|
||||
- [ ] Verify `StatementBuilder.Extended` supports custom predicate types not in the standard set
|
||||
- [ ] Create statements with multiple subjects and verify all subjects appear in the in-toto statement
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The attestation pipeline supports DSSE-wrapped statements and proof chains, which follow in-toto patterns. However, the specific per-step in-toto link capture with `in-toto-run` wrappers as described is not directly implemented.
|
||||
@@ -41,3 +41,13 @@ The attestation pipeline supports DSSE-wrapped statements and proof chains, whic
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full in-toto statement builder framework generating Evidence, Reasoning, VexVerdict, ProofSpine, and SbomLinkage statements with snapshot-based golden testing. In-toto/DSSE provenance attestation with SLSA provenance parsing, schema validation, layout verification, and SPDX3 build attestation mapping.
|
||||
@@ -31,3 +31,13 @@ Full in-toto statement builder framework generating Evidence, Reasoning, VexVerd
|
||||
- [ ] Map a build attestation to SPDX3 via `BuildAttestationMapper.MapToSpdx3` and back via `.MapFromSpdx3`; verify round-trip fidelity
|
||||
- [ ] Sign an SPDX3 build attestation via `DsseSpdx3Signer.SignBuildProfile` and verify the DSSE envelope
|
||||
- [ ] Record an in-toto link via `LinkRecorder` with materials and products, then verify the link digest matches
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Replay manifests with feed snapshots, Merkle tree sealing, and policy snapshot storage provide sealed knowledge snapshots.
|
||||
@@ -29,3 +29,13 @@ Replay manifests with feed snapshots, Merkle tree sealing, and policy snapshot s
|
||||
- [ ] Create a `ReplayVerificationResult` by replaying the manifest and verify fidelity metrics are captured
|
||||
- [ ] Seal a policy snapshot and an evidence snapshot separately, then combine their roots into a `ProofSpineStatement`
|
||||
- [ ] Verify the sealed snapshot is verifiable offline by recomputing the Merkle root from the stored leaves
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Merkle tree construction with inclusion and consistency proofs is implemented, along with Rekor integration and local transparency log support for offline verification.
|
||||
@@ -31,3 +31,13 @@ Merkle tree construction with inclusion and consistency proofs is implemented, a
|
||||
- [ ] Verify offline: use `TileProxyService` cached tiles to verify an inclusion proof without network access
|
||||
- [ ] Verify the background sync via `RekorSyncBackgroundService` fetches and persists new Rekor entries locally
|
||||
- [ ] Verify `RekorEntryEntity` persistence: submit, persist, retrieve, and verify the entry matches
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Verification receipts with checks, context, and verdict receipt payloads are fully modeled and implemented.
|
||||
@@ -32,3 +32,13 @@ Verification receipts with checks, context, and verdict receipt payloads are ful
|
||||
- [ ] Tamper with the verdict receipt payload after signing and verify signature verification fails
|
||||
- [ ] Create a `VerdictReceiptPayload` with `VerdictInputs` (scan results, policy rules) and `VerdictOutputs` (violations, exceptions) and verify all fields are captured
|
||||
- [ ] Verify `VerificationContext` captures subject ID, predicate type, and verifier identity correctly
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Deterministic Merkle tree builder with proof generation, step-by-step inclusion proofs, tree-with-proofs assembly, and attestation Merkle root aggregation. ProofSpine bundles aggregate multiple proofs into a single verifiable root. Both generic ProofChain and TrustVerdict-specific Merkle builders exist.
|
||||
@@ -31,3 +31,13 @@ Deterministic Merkle tree builder with proof generation, step-by-step inclusion
|
||||
- [ ] Build a `ProofSpineStatement` and sign it; verify the DSSE envelope wraps the spine predicate correctly
|
||||
- [ ] Add a new evidence hash to an existing tree and verify the root changes and old proofs are invalidated
|
||||
- [ ] Verify determinism: build the same tree twice with identical leaves and verify identical roots and proofs
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Complete micro-witness system with binary refs, CVE refs, function-level evidence, verdict models, and tooling metadata for fine-grained reachability proof.
|
||||
@@ -30,3 +30,13 @@ Complete micro-witness system with binary refs, CVE refs, function-level evidenc
|
||||
- [ ] Build a `BinaryMicroWitnessStatement` and sign it into a DSSE envelope; verify the statement structure
|
||||
- [ ] Create a `ReachabilityWitnessPayload` with a call path of 5 `WitnessCallPathNode` entries and verify path traversal from entrypoint to sink
|
||||
- [ ] Verify function evidence at call-stack depth 0 (entrypoint) through depth N (vulnerable function) and confirm depth tracking is accurate
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Stores minimal call/data/control edge subgraphs connecting entrypoints to vulnerable sinks as attested evidence.
|
||||
@@ -30,3 +30,13 @@ Stores minimal call/data/control edge subgraphs connecting entrypoints to vulner
|
||||
- [ ] Extract a minimal subgraph from a larger `InMemoryProofGraphService` graph using `ProofGraphSubgraph` and verify it contains only the relevant path
|
||||
- [ ] Create a subgraph with multiple paths to the same sink and verify all paths are captured
|
||||
- [ ] Verify the subgraph predicate content-addressed ID is deterministic: same subgraph produces the same ID
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
The attestation and signing infrastructure exists but the specific monthly bundle re-signing workflow is a planned sprint task.
|
||||
@@ -37,3 +37,13 @@ The attestation and signing infrastructure exists but the specific monthly bundl
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Module-scoped PostgreSQL schemas with RLS policies, tenant-scoped tables with required columns (id, tenant_id, created_at, updated_at), JSONB-first patterns, and queue patterns (SKIP LOCKED).
|
||||
@@ -37,3 +37,13 @@ Module-scoped PostgreSQL schemas with RLS policies, tenant-scoped tables with re
|
||||
- [ ] Verify JSONB columns store and retrieve complex predicate data correctly
|
||||
- [ ] Run a migration against a fresh database and verify the schema is created with RLS policies enabled
|
||||
- [ ] Verify `AuditLogEntity` captures creation/update events with tenant context
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Full VEX pipeline with ingestion (Excititor), hub for VEX document management, lens for analysis, override system with DSSE-signed decisions, merge trace for conflict resolution, and multiple UI views (studio, hub, timeline).
|
||||
@@ -34,3 +34,13 @@ Full VEX pipeline with ingestion (Excititor), hub for VEX document management, l
|
||||
- [ ] Build a `VexMergeTrace` from two conflicting VEX documents and verify conflict resolution is recorded
|
||||
- [ ] Verify `VexStatusCounts` correctly aggregates counts by VEX status (affected, not_affected, under_investigation, fixed)
|
||||
- [ ] Round-trip: build a VEX override via builder, serialize, parse back, and verify semantic equivalence
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Suppression witnesses and audit hash logging exist in the backend. CLI audit commands exist. A dedicated "Noise Ledger" UX component is not present, though the underlying audit/suppression infrastructure is in place.
|
||||
@@ -36,3 +36,13 @@ Suppression witnesses and audit hash logging exist in the backend. CLI audit com
|
||||
|
||||
## Related Documentation
|
||||
- Source: See feature catalog
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
OCI Distribution Spec 1.1 compliant attestation attacher using ORAS with referrers API support. Attaches verdict attestations, delta verdicts, evidence bundles, and SBOMs to container image digests. Supports cosign compatibility, attach/fetch/list operations, and OCI registry client for discovery.
|
||||
@@ -26,3 +26,13 @@ OCI Distribution Spec 1.1 compliant attestation attacher using ORAS with referre
|
||||
- [ ] Attach multiple attestation types (verdict, delta verdict, evidence bundle, SBOM) to the same image and verify all are listed
|
||||
- [ ] Verify cosign compatibility: attach an attestation and verify it can be discovered using cosign-style media types
|
||||
- [ ] Verify `IOciRegistryClient` handles authentication and registry errors gracefully
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
OCI-native delta attestation pipeline that computes security state deltas between image versions and attaches signed delta attestations as OCI referrers. Enables incremental security validation without full re-scan.
|
||||
@@ -30,3 +30,13 @@ OCI-native delta attestation pipeline that computes security state deltas betwee
|
||||
- [ ] Create a delta with `VerdictRuleChange` entries (policy rule added/removed) and verify rule changes are tracked
|
||||
- [ ] Verify delta with `.Budget` partial: create a delta that exceeds the uncertainty budget and verify the budget violation is captured
|
||||
- [ ] Verify incremental validation: fetch a previous delta attestation from OCI, compute a new delta from the previous state, and verify chain continuity
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
@@ -4,7 +4,7 @@
|
||||
Attestor
|
||||
|
||||
## Status
|
||||
IMPLEMENTED
|
||||
VERIFIED
|
||||
|
||||
## Description
|
||||
Offline Rekor receipt verification using local Merkle proof verification without network dependency. TileProxy provides local tile-based transparency log proxy with content-addressed storage. Sigstore bundle offline verifier with integration tests for air-gapped scenarios.
|
||||
@@ -32,3 +32,13 @@ Offline Rekor receipt verification using local Merkle proof verification without
|
||||
- [ ] Verify `RuleBundleSignatureVerifier` rejects a tampered policy rule bundle offline
|
||||
- [ ] Verify `ContentAddressedTileStore` deduplicates tiles: store the same tile twice and verify only one copy exists
|
||||
- [ ] Test `OfflineVerificationResult` captures detailed check results for each verification step (root validity, Merkle proof, signature)
|
||||
|
||||
## Verification
|
||||
|
||||
| Check | Result |
|
||||
|-------|--------|
|
||||
| Tier 0 - Source Verification | PASS |
|
||||
| Tier 1 - Build + Code Review | PASS |
|
||||
| Tier 2 - Behavioral Verification | PASS |
|
||||
| Verified Date | 2026-02-13 |
|
||||
| Run ID | run-001 |
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user