-
Notifications
You must be signed in to change notification settings - Fork 72
Closed
Labels
enhancementNew feature or requestNew feature or request
Description
Problem
The governance toolkit audits agent behavior with cryptographic chains, but does not verify its own integrity. A supply chain attack on any of the five packages could silently neuter enforcement while logging clean results. ''Who watches the watcher'' is unaddressed.
What Exists
- ✅ Merkle chain audit trail with hash verification
- ✅ Plugin signature verification (Ed25519)
- ✅ SBOM + GitHub attestations on release
- ❌ No module hash verification at startup
- ❌ No runtime watchdog for policy engine code
- ❌ No code signing on PyPI publish (trusted publishing only)
Proposed Solution
- Bootstrap integrity: Hash all governance module files at startup, compare against published manifest
- Runtime watchdog: Periodic
__code__hash check on critical enforcement functions - Package signing: Sign wheel files with Sigstore during release
- Integrity manifest: Ship
integrity.jsonwith SHA-256 hashes of all source files
/cc @imran-siddique
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request