Files
git.stella-ops.org/docs/modules/graph/contracts/examples/graph.inspect.v1.sample.json
StellaOps Bot 8768c27f30
Some checks failed
Docs CI / lint-and-preview (push) Has been cancelled
Signals DSSE Sign & Evidence Locker / sign-signals-artifacts (push) Has been cancelled
Signals DSSE Sign & Evidence Locker / verify-signatures (push) Has been cancelled
Add signal contracts for reachability, exploitability, trust, and unknown symbols
- Introduced `ReachabilityState`, `RuntimeHit`, `ExploitabilitySignal`, `ReachabilitySignal`, `SignalEnvelope`, `SignalType`, `TrustSignal`, and `UnknownSymbolSignal` records to define various signal types and their properties.
- Implemented JSON serialization attributes for proper data interchange.
- Created project files for the new signal contracts library and corresponding test projects.
- Added deterministic test fixtures for micro-interaction testing.
- Included cryptographic keys for secure operations with cosign.
2025-12-05 00:27:00 +02:00

101 lines
3.8 KiB
JSON

{
"schemaVersion": "graph.inspect.v1",
"tenant": "acme-dev",
"artifactDigest": "sha256:8f2c1f4c8f9d4c3bb2efc0a9d0a35d4492a0bba4f3c1a2b9d5c7e1f4a8c6b2d1",
"sbomDigest": "sha256:1c2d3e4f5a6b7c8d9e0f1a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d",
"collectedAt": "2025-12-04T15:30:00Z",
"components": [
{
"purl": "pkg:maven/org.example/foo@1.2.3",
"version": "1.2.3",
"scopes": [
"runtime"
],
"relationships": [
{
"type": "contains",
"targetPurl": "pkg:docker/library/alpine@3.19.0",
"scope": "runtime",
"evidenceHash": "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcd",
"source": "scanner.sbom.v1"
},
{
"type": "depends_on",
"targetPurl": "pkg:npm/lodash@4.17.21",
"scope": "runtime",
"evidenceHash": "89abcdef0123456789abcdef0123456789abcdef0123456789abcdef012345",
"source": "concelier.linkset.v1"
}
],
"advisories": [
{
"advisoryId": "CVE-2024-1111",
"source": "ghsa",
"status": "affected",
"severity": "HIGH",
"cvss": {
"vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"score": 9.8
},
"justification": "exploitable_in_default_config",
"justificationSummary": "Unauthenticated RCE in JSON parser; no mitigations applied.",
"linksetDigest": "abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcd",
"evidenceHash": "fedcba9876543210fedcba9876543210fedcba9876543210fedcba9876543210",
"modifiedAt": "2025-11-30T12:00:00Z",
"provenance": {
"source": "concelier.linkset.v1",
"collectedAt": "2025-11-30T11:55:00Z",
"eventOffset": 4421,
"linksetDigest": "abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcd",
"evidenceHash": "fedcba9876543210fedcba9876543210fedcba9876543210fedcba9876543210"
}
}
],
"vexStatements": [
{
"statementId": "VEX-2025-0001",
"source": "excitor.vex.v1",
"status": "not_affected",
"justification": "component_not_present",
"impactStatement": "Library excluded from production image; only used in tests.",
"knownExploited": false,
"issuedAt": "2025-12-01T08:00:00Z",
"expiresAt": "2026-12-01T00:00:00Z",
"evidenceHash": "0f1e2d3c4b5a69788796a5b4c3d2e1f00f1e2d3c4b5a69788796a5b4c3d2e1f0",
"provenance": {
"source": "excitor.overlay.v1",
"collectedAt": "2025-12-01T08:00:00Z",
"eventOffset": 171,
"evidenceHash": "0f1e2d3c4b5a69788796a5b4c3d2e1f00f1e2d3c4b5a69788796a5b4c3d2e1f0"
}
}
],
"provenance": {
"source": "concelier.linkset.v1",
"collectedAt": "2025-12-04T15:29:00Z",
"eventOffset": 5123,
"linksetDigest": "abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcd",
"evidenceHash": "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcd"
}
},
{
"purl": "pkg:npm/lodash@4.17.21",
"scopes": [],
"relationships": [],
"advisories": [],
"vexStatements": [],
"provenance": {
"source": "concelier.linkset.v1",
"collectedAt": "2025-12-04T15:29:00Z",
"eventOffset": 6000,
"linksetDigest": "abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcd",
"evidenceHash": "89abcdef0123456789abcdef0123456789abcdef0123456789abcdef012345"
}
}
],
"links": {
"sbomObservationEventId": "obs-2025-11-22-001",
"linksetDigest": "abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcd"
}
}