You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See [docs/threat-model.md](docs/threat-model.md) for threat classes, residual risks, and security invariants. See [docs/security-status.md](docs/security-status.md) for implementation status of all 45 milestones.
162
+
See [docs/threat-model.md](docs/threat-model.md) for threat classes, residual risks, and security invariants. See [docs/security-status.md](docs/security-status.md) for implementation status of all 46 milestones.
155
163
156
164
### Verify Image Signatures
157
165
@@ -209,15 +217,20 @@ See [docs/policy-schema.md](docs/policy-schema.md) for full schema reference. Se
209
217
210
218
### CI Verification Evidence
211
219
212
-
Each CI job produces specific security evidence:
213
-
214
-
| Job | What It Proves |
215
-
|-----|---------------|
216
-
|`security-regression`| Adversarial test suite: prompt injection, policy bypass, containment |
217
-
|`supply-chain-verify`| SBOM generation via Syft, cosign availability, provenance keywords |
218
-
|`go-build-and-test`| 399 Go tests across 9 services with `-race`|
|`test-count-check`| Prevents documented test counts from drifting below actual |
220
+
All CI jobs are defined in [`.github/workflows/ci.yml`](.github/workflows/ci.yml). View the [latest CI run](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml).
221
+
222
+
| Job | Workflow Link | What It Proves |
223
+
|-----|--------------|---------------|
224
+
|`go-build-and-test`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| 399 Go tests across 9 services with `-race` (build, test, vet) |
|`supply-chain-verify`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| SBOM generation via Syft, cosign availability, provenance keywords in release/build workflows |
228
+
|`test-count-check`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| Prevents documented test counts from drifting below actual (source of truth: [test-counts.json](docs/test-counts.json)) |
|`shellcheck`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| Static analysis of all shell scripts (first-boot, build, verify-release, etc.) |
231
+
|`policy-validate`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| YAML schema validation for all policy and recipe files |
232
+
|`check-pins`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| Verifies all GitHub Actions are pinned to specific commit SHAs (not tags) |
233
+
|`docs-validation`|[View job](https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml)| Broken link detection, required docs presence, test-counts.json format validation |
221
234
222
235
---
223
236
@@ -229,7 +242,7 @@ Each CI job produces specific security evidence:
@@ -410,6 +427,7 @@ See [docs/test-matrix.md](docs/test-matrix.md) for full breakdown.
410
427
-[x]**Milestone 43** -- Stronger isolation: sandbox tightening, adversarial tests, CI security regression, MCP isolation, recovery ceremonies, M5 acceptance suite
411
428
-[x]**Milestone 44** -- Auditability and documentation hardening: test-count drift CI check, CI evidence links and badges, M4/M5 terminology disambiguation, audit quick-path doc, recovery runbook, verify-release script, security/product roadmap split
412
429
-[x]**Milestone 45** -- Production readiness hardening: incident persistence (file-backed), graceful shutdown for all Go services, HTTP timeouts, systemd production hardening, first-boot validation, audit log rotation, CI vulnerability scanning, production operations guide
430
+
-[x]**Milestone 46** -- Operational maturity: bootstrap trust gap fix (cosign verify before rebase), CI runs on all changes (removed paths-ignore for .md), Python quality gates (ruff + bandit + split test suites), docs-validation CI job, production-readiness checklist, SLOs, release channel policy, support lifecycle, sample verification output
0 commit comments