11# SecAI OS
22
33[ ![ CI] ( https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml/badge.svg )] ( https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/ci.yml )
4+ [ ![ Build] ( https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/build.yml/badge.svg )] ( https://github.com/SecAI-Hub/SecAI_OS/actions/workflows/build.yml )
45[ ![ License: Apache-2.0] ( https://img.shields.io/badge/License-Apache_2.0-blue.svg )] ( LICENSE )
56[ ![ Fedora 42] ( https://img.shields.io/badge/Fedora-42-blue )] ( https://fedoraproject.org/ )
67[ ![ uBlue] ( https://img.shields.io/badge/Built_on-uBlue-purple )] ( https://universal-blue.org/ )
@@ -150,7 +151,7 @@ Every model passes through the same fully automatic pipeline:
150151| ** Updates** | Cosign-verified rpm-ostree, staged workflow, greenboot auto-rollback |
151152| ** Supply Chain** | Per-service CycloneDX SBOMs, SLSA3 provenance attestation, cosign-signed checksums |
152153
153- See [ docs/threat-model.md] ( docs/threat-model.md ) for threat classes, residual risks, and security invariants. See [ docs/security-status.md] ( docs/security-status.md ) for implementation status of all 43 milestones.
154+ See [ docs/threat-model.md] ( docs/threat-model.md ) for threat classes, residual risks, and security invariants. See [ docs/security-status.md] ( docs/security-status.md ) for implementation status of all 44 milestones.
154155
155156### Verify Image Signatures
156157
@@ -192,6 +193,34 @@ See [docs/policy-schema.md](docs/policy-schema.md) for full schema reference. Se
192193
193194---
194195
196+ ## Verification & Audit
197+
198+ ### Workflow Files
199+
200+ - [ CI Workflow] ( .github/workflows/ci.yml )
201+ - [ Build Workflow] ( .github/workflows/build.yml )
202+ - [ Release Workflow] ( .github/workflows/release.yml )
203+
204+ ### Security Documentation
205+
206+ - [ M5 Control Matrix] ( docs/m5-control-matrix.md )
207+ - [ Supply Chain Provenance] ( docs/supply-chain-provenance.md )
208+ - [ Security Status] ( docs/security-status.md )
209+
210+ ### CI Verification Evidence
211+
212+ Each CI job produces specific security evidence:
213+
214+ | Job | What It Proves |
215+ | -----| ---------------|
216+ | ` security-regression ` | Adversarial test suite: prompt injection, policy bypass, containment |
217+ | ` supply-chain-verify ` | SBOM generation via Syft, cosign availability, provenance keywords |
218+ | ` go-build-and-test ` | 399 Go tests across 9 services with ` -race ` |
219+ | ` python-test ` | 718 Python tests (agent, adversarial, M5 acceptance, UI, pipeline) |
220+ | ` test-count-check ` | Prevents documented test counts from drifting below actual |
221+
222+ ---
223+
195224## Documentation
196225
197226| Document | Description |
@@ -200,8 +229,8 @@ See [docs/policy-schema.md](docs/policy-schema.md) for full schema reference. Se
200229| [ Threat Model] ( docs/threat-model.md ) | Threat classes, invariants, residual risks |
201230| [ API Reference] ( docs/api.md ) | HTTP API for all services |
202231| [ Policy Schema] ( docs/policy-schema.md ) | Full policy.yaml schema reference |
203- | [ Security Status] ( docs/security-status.md ) | Implementation status of all 43 milestones |
204- | [ Test Matrix] ( docs/test-matrix.md ) | Test coverage: 1000+ tests across Go, Python, shell |
232+ | [ Security Status] ( docs/security-status.md ) | Implementation status of all 44 milestones |
233+ | [ Test Matrix] ( docs/test-matrix.md ) | Test coverage: 1,117 tests across Go and Python (see [ test-counts.json ] ( docs/test-counts.json ) ) |
205234| [ Compatibility Matrix] ( docs/compatibility-matrix.md ) | GPU, VM, and hardware support |
206235| [ Security Test Matrix] ( docs/security-test-matrix.md ) | Security feature test coverage |
207236| [ FAQ] ( docs/faq.md ) | Common questions |
@@ -226,6 +255,9 @@ See [docs/policy-schema.md](docs/policy-schema.md) for full schema reference. Se
226255| [ Incident Recorder] ( docs/components/incident-recorder.md ) | Security event capture and auto-containment |
227256| [ M5 Control Matrix] ( docs/m5-control-matrix.md ) | M5 acceptance criteria, enforcement paths, operator verification |
228257| [ Supply Chain Provenance] ( docs/supply-chain-provenance.md ) | Provenance pipeline, SBOM coverage, key material |
258+ | [ Audit Quick Path] ( docs/audit-quick-path.md ) | External auditor step-by-step verification guide |
259+ | [ Recovery Runbook] ( docs/recovery-runbook.md ) | Operator procedures for degradation, containment, and recovery |
260+ | [ Sample Release Bundle] ( docs/sample-release-bundle.md ) | Release artifact structure and verification commands |
229261
230262### Install Guides
231263
@@ -308,13 +340,13 @@ Privacy: Tor-routed, PII stripped, injection detection, privacy-preserving query
308340## Running Tests
309341
310342``` bash
311- # Go tests (348 total across 9 services)
343+ # Go tests (399 total across 9 services)
312344for svc in airlock registry tool-firewall gpu-integrity-watch mcp-firewall \
313345 policy-engine runtime-attestor integrity-monitor incident-recorder; do
314346 (cd services/$svc && go test -v -race ./...)
315347done
316348
317- # Python tests (658 total)
349+ # Python tests (718 total)
318350pip install pytest flask requests pyyaml
319351python -m pytest tests/ -v
320352
@@ -329,52 +361,53 @@ See [docs/test-matrix.md](docs/test-matrix.md) for full breakdown.
329361## Roadmap
330362
331363<details >
332- <summary >All 43 milestones (click to expand)</summary >
333-
334- - [x] ** M0** -- Threat model, dataflow, invariants, policy files
335- - [x] ** M1** -- Bootable OS, encrypted vault, GPU drivers
336- - [x] ** M2** -- Trusted Registry, hash pinning, cosign verification
337- - [x] ** M3** -- 7-stage quarantine pipeline
338- - [x] ** M4** -- Tool Firewall, default-deny policy
339- - [x] ** M5** -- Online Airlock, sanitization
340- - [x] ** M6** -- Systemd sandboxing, kernel hardening, nftables
341- - [x] ** M7** -- CI/CD, Go/Python tests, shellcheck
342- - [x] ** M8** -- Image/video generation, diffusion worker
343- - [x] ** M9** -- Multi-GPU support (NVIDIA/AMD/Intel/Apple)
344- - [x] ** M10** -- Tor-routed search, SearXNG, PII stripping
345- - [x] ** M11** -- VM support, OVA/QCOW2 builds
346- - [x] ** M12** -- Model integrity monitoring
347- - [x] ** M13** -- Tamper-evident audit logs
348- - [x] ** M14** -- Local passphrase auth
349- - [x] ** M15** -- Vault auto-lock
350- - [x] ** M16** -- Seccomp-BPF + Landlock process isolation
351- - [x] ** M17** -- Secure Boot + TPM2 measured boot
352- - [x] ** M18** -- Memory protection (swap/zswap/core dumps/mlock/TEE)
353- - [x] ** M19** -- Traffic analysis protection
354- - [x] ** M20** -- Privacy-preserving query obfuscation for search
355- - [x] ** M21** -- Clipboard isolation
356- - [x] ** M22** -- Canary/tripwire system
357- - [x] ** M23** -- Emergency wipe (3-level panic)
358- - [x] ** M24** -- Update verification + auto-rollback
359- - [x] ** M25** -- UI polish + security hardening
360- - [x] ** M26** -- Fail-closed pipeline, service auth, CSRF, supply chain pinning
361- - [x] ** M27** -- Enhanced scanners, provenance manifests, fs-verity
362- - [x] ** M28** -- Weight distribution fingerprinting
363- - [x] ** M29** -- Garak LLM vulnerability scanner
364- - [x] ** M30** -- gguf-guard deep GGUF integrity scanner
365- - [x] ** M31** -- Agent Mode (Phase 1: safe local autopilot)
366- - [x] ** M32** -- GPU Integrity Watch (continuous GPU runtime verification)
367- - [x] ** M33** -- MCP Firewall (Model Context Protocol policy gateway)
368- - [x] ** M34** -- Release provenance + per-service SBOMs (SLSA3, CycloneDX, cosign)
369- - [x] ** M35** -- Unified policy decision engine (6 domains, OPA/Rego-upgradeable)
370- - [x] ** M36** -- Runtime attestation + startup gating (TPM2, HMAC state bundles)
371- - [x] ** M37** -- Continuous integrity monitor (baseline-verified file watcher)
372- - [x] ** M38** -- Incident recorder + containment automation (9 classes, 4-state lifecycle)
373- - [x] ** M39** -- GPU integrity deep integration (driver fingerprinting, attestor/incident wiring)
374- - [x] ** M40** -- Agent verified supervisor hardening (signed tokens, replay protection, two-phase approval)
375- - [x] ** M41** -- HSM-backed key handling (pluggable keystore: software/TPM2/PKCS#11)
376- - [x] ** M42** -- Enforcement wiring + CI supply chain verification
377- - [x] ** M43** -- Stronger isolation: sandbox tightening, adversarial tests, CI security regression, MCP isolation, recovery ceremonies, M5 acceptance suite
364+ <summary >All 44 project milestones (click to expand)</summary >
365+
366+ - [x] ** Milestone 0** -- Threat model, dataflow, invariants, policy files
367+ - [x] ** Milestone 1** -- Bootable OS, encrypted vault, GPU drivers
368+ - [x] ** Milestone 2** -- Trusted Registry, hash pinning, cosign verification
369+ - [x] ** Milestone 3** -- 7-stage quarantine pipeline
370+ - [x] ** Milestone 4** -- Tool Firewall, default-deny policy
371+ - [x] ** Milestone 5** -- Online Airlock, sanitization
372+ - [x] ** Milestone 6** -- Systemd sandboxing, kernel hardening, nftables
373+ - [x] ** Milestone 7** -- CI/CD, Go/Python tests, shellcheck
374+ - [x] ** Milestone 8** -- Image/video generation, diffusion worker
375+ - [x] ** Milestone 9** -- Multi-GPU support (NVIDIA/AMD/Intel/Apple)
376+ - [x] ** Milestone 10** -- Tor-routed search, SearXNG, PII stripping
377+ - [x] ** Milestone 11** -- VM support, OVA/QCOW2 builds
378+ - [x] ** Milestone 12** -- Model integrity monitoring
379+ - [x] ** Milestone 13** -- Tamper-evident audit logs
380+ - [x] ** Milestone 14** -- Local passphrase auth
381+ - [x] ** Milestone 15** -- Vault auto-lock
382+ - [x] ** Milestone 16** -- Seccomp-BPF + Landlock process isolation
383+ - [x] ** Milestone 17** -- Secure Boot + TPM2 measured boot
384+ - [x] ** Milestone 18** -- Memory protection (swap/zswap/core dumps/mlock/TEE)
385+ - [x] ** Milestone 19** -- Traffic analysis protection
386+ - [x] ** Milestone 20** -- Privacy-preserving query obfuscation for search
387+ - [x] ** Milestone 21** -- Clipboard isolation
388+ - [x] ** Milestone 22** -- Canary/tripwire system
389+ - [x] ** Milestone 23** -- Emergency wipe (3-level panic)
390+ - [x] ** Milestone 24** -- Update verification + auto-rollback
391+ - [x] ** Milestone 25** -- UI polish + security hardening
392+ - [x] ** Milestone 26** -- Fail-closed pipeline, service auth, CSRF, supply chain pinning
393+ - [x] ** Milestone 27** -- Enhanced scanners, provenance manifests, fs-verity
394+ - [x] ** Milestone 28** -- Weight distribution fingerprinting
395+ - [x] ** Milestone 29** -- Garak LLM vulnerability scanner
396+ - [x] ** Milestone 30** -- gguf-guard deep GGUF integrity scanner
397+ - [x] ** Milestone 31** -- Agent Mode (Phase 1: safe local autopilot)
398+ - [x] ** Milestone 32** -- GPU Integrity Watch (continuous GPU runtime verification)
399+ - [x] ** Milestone 33** -- MCP Firewall (Model Context Protocol policy gateway)
400+ - [x] ** Milestone 34** -- Release provenance + per-service SBOMs (SLSA3, CycloneDX, cosign)
401+ - [x] ** Milestone 35** -- Unified policy decision engine (6 domains, OPA/Rego-upgradeable)
402+ - [x] ** Milestone 36** -- Runtime attestation + startup gating (TPM2, HMAC state bundles)
403+ - [x] ** Milestone 37** -- Continuous integrity monitor (baseline-verified file watcher)
404+ - [x] ** Milestone 38** -- Incident recorder + containment automation (9 classes, 4-state lifecycle)
405+ - [x] ** Milestone 39** -- GPU integrity deep integration (driver fingerprinting, attestor/incident wiring)
406+ - [x] ** Milestone 40** -- Agent verified supervisor hardening (signed tokens, replay protection, two-phase approval)
407+ - [x] ** Milestone 41** -- HSM-backed key handling (pluggable keystore: software/TPM2/PKCS#11)
408+ - [x] ** Milestone 42** -- Enforcement wiring + CI supply chain verification
409+ - [x] ** Milestone 43** -- Stronger isolation: sandbox tightening, adversarial tests, CI security regression, MCP isolation, recovery ceremonies, M5 acceptance suite
410+ - [x] ** Milestone 44** -- Auditability and documentation hardening: test-count drift CI check, CI evidence links and badges, M4/M5 terminology disambiguation, audit quick-path doc, recovery runbook, verify-release script, security/product roadmap split
378411
379412</details >
380413
@@ -406,7 +439,7 @@ services/
406439 search-mediator/ Python -- Tor-routed web search (:8485)
407440 ui/ Python/Flask -- Web UI (:8480)
408441 common/ Python -- Shared utilities (audit, auth, mlock)
409- tests/ 658 Python tests, 348 Go tests (~1006 total)
442+ tests/ 718 Python tests, 399 Go tests (1,117 total)
410443docs/ Architecture, API, threat model, install guides
411444schemas/ OpenAPI spec, JSON Schema for config files
412445examples/ Task-oriented walkthroughs
0 commit comments