You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Epic 2: Unify image refs to ghcr.io/secai-hub/secai_os + CI enforcement
Fix 22 occurrences of wrong image reference (ghcr.io/sec_ai/secai_os)
across 12 files — scripts, configs, docs, and VM build tooling. All
container image references now use the canonical path matching the
GitHub org (SecAI-Hub/SecAI_OS).
Add CI enforcement:
- image-ref-consistency job greps for known wrong patterns
- docs-validation step verifies release-artifacts.json matches
release.yml service matrix
- Python test suite (test_image_ref_consistency.py) with 10 tests
covering repo-wide scan, critical file assertions, and negative
detection verification
- Machine-readable release-artifacts.json as single source of truth
for expected release artifact patterns
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Copy file name to clipboardExpand all lines: docs/m5-control-matrix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Last updated: 2026-03-14
33
33
| 23 | Prompt injection detection | MCP Firewall global rules | Shell metacharacters and prompt patterns detected and denied |`TestAdversarial_MalformedMCPPayload`| Global rule match in audit log |`go test -run TestAdversarial_MalformedMCPPayload ./services/mcp-firewall/...`|
34
34
| 24 | MCP taint tracking | MCP Firewall taint.go | Session-scoped taint propagation prevents data flow violations |`TestAdversarial_TaintBypassAttempt`, `TestTaint_*`| Taint entries per session ID |`go test -run "TestTaint\|TestAdversarial_Taint" ./services/mcp-firewall/...`|
35
35
| 25 | SBOM generation verification | CI supply-chain-verify job | Syft generates SBOMs for all services | CI workflow step output | CycloneDX SBOM artifacts |`syft dir:services/registry -o cyclonedx-json` (repeat per service) |
36
-
| 26 | Release provenance attestation | Release workflow (release.yml) | cosign attest with SLSA3 provenance | CI workflow attestation step | Signed provenance attestation |`cosign verify-attestation --type slsa ghcr.io/sec_ai/secai_os:latest`|
36
+
| 26 | Release provenance attestation | Release workflow (release.yml) | cosign attest with SLSA3 provenance | CI workflow attestation step | Signed provenance attestation |`cosign verify-attestation --type slsa ghcr.io/secai-hub/secai_os:latest`|
0 commit comments