Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion manifest.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1351,7 +1351,7 @@ templates:
Security audit of code or a system component. Systematic
vulnerability analysis with severity classification.
persona: security-auditor
protocols: [anti-hallucination, self-verification, operational-constraints, security-vulnerability]
protocols: [anti-hallucination, self-verification, operational-constraints, adversarial-falsification, security-vulnerability]
Comment thread
Alan-Jowett marked this conversation as resolved.
taxonomies: [stack-lifetime-hazards]
format: investigation-report

Expand Down
15 changes: 15 additions & 0 deletions protocols/analysis/security-vulnerability.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,21 @@ For every external input:
re-encoded, decoded, or transformed before use.
4. Check for **integer overflow/underflow** in size or length parameters
derived from external input.
5. **Validation provenance check**: For every candidate vulnerability at
a use site, trace **backward** to find all validation that may have
occurred between the input's entry and the use. Check:
- Caller functions that decode or validate before passing values
(e.g., a header-decode helper that checks `Field > MaxAllowed`
before the caller uses `Field` in arithmetic)
- Helper functions called earlier in the same code path
- API postconditions — when a system API (e.g., kernel API, stdlib)
returns success, what guarantees does it make about output buffer
contents, lengths, or value ranges?
- Initialization-time invariants — constructor or init functions
that constrain values to safe ranges (e.g., power-of-2
requirements, maximum bounds)
Do NOT report a finding until you have confirmed that no upstream
validation neutralizes it.
Comment thread
Alan-Jowett marked this conversation as resolved.
Outdated

## Phase 3: Authentication and Authorization

Expand Down
6 changes: 6 additions & 0 deletions protocols/guardrails/self-verification.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,12 @@ presenting it as final. Treat it as a pre-submission checklist.
- Does the evidence actually support the conclusion stated?
- If any sampled item fails verification, **re-examine all items of
the same type** before proceeding.
- For each sampled finding, apply **symmetric falsification**: attempt
to disprove the finding with the same rigor you applied when
falsifying candidate findings that you concluded were safe. Ask:
"Is there a validation, API contract, or initialization invariant
I missed that makes this safe?" If you cannot answer "no" with
specific code evidence, downgrade or remove the finding.
Comment thread
Alan-Jowett marked this conversation as resolved.
Outdated

### 2. Citation Audit

Expand Down
1 change: 1 addition & 0 deletions templates/investigate-security.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ protocols:
- guardrails/anti-hallucination
- guardrails/self-verification
- guardrails/operational-constraints
- guardrails/adversarial-falsification
- analysis/security-vulnerability
taxonomies:
- stack-lifetime-hazards
Expand Down
Loading