Skip to content

Attestation Evidence Audit — Main Tracker #133

@AlexKantor87

Description

@AlexKantor87

Attestation Evidence Audit — Main Tracker

Systematic review of all 31 attestation types across the agentic SDLC pipeline. Each ticket gets multi-persona analysis (Pipeline Engineer, Security Architect, Compliance Officer, Reliability Engineer) followed by critical audit review (Internal Auditor, Red Team, AI Governance Specialist).

Process

  1. ✅ Template agreed
  2. ✅ All 31 sub-tickets created with template headings
  3. ✅ Pilot: Fill + audit artifact-integrity-control end-to-end
  4. ✅ Review pilot quality, refine approach
  5. ✅ Scale to remaining 30 tickets
  6. ✅ Synthesis: summary table + remediation backlog (see comments below)

Summary Statistics

Metric Count
Total attestation types audited 31
PASS (clean) 4
PASS WITH OBSERVATIONS 5
CONDITIONAL / QUALIFIED PASS 3
ADEQUATE (various) 7
SOUND WITH KNOWN LIMITATIONS 1
NEEDS IMPROVEMENT 9
INADEQUATE 0
Total gaps identified ~140
P1 recommendations 6
Code bugs found 7

Strongest group: AI Review Steps (Group D) — 4 clean PASSes, well-structured schemas and jq rules.
Weakest group: Build Flow Controls (Group F) — 6/7 NEEDS IMPROVEMENT, all use type: generic bypassing server-side validation.


Group A: Review Flow — CI Gate

Group B: Review Flow — Orchestration

Group C: Review Flow — Resolver

Group D: Review Flow — AI Review Steps

Group E: Review Flow — Governance

Group F: Build Flow

🔴 = priority:high (compliance-critical)


Known Issues (Pre-Audit)

  1. ✅ Confirmed: Build flow controls use generic type — custom types with jq rules exist but aren't used
  2. ✅ Confirmed: 4 build controls have no custom type at all (lint, unit-test, integration-test, cost)
  3. ✅ Confirmed: pre-review-docker-build is generic — no schema/jq validation on source_fingerprint
  4. ✅ Confirmed: resolver-threads-triaged has self-attestation risk (agent sets its own compliance field)
  5. ✅ Confirmed: Ticket integrity lock relies on forgeable comment string matching

New Issues (Discovered During Audit)

  1. severities_updated hardcoded to 0 in cross-model-severity ([Audit] #8 cross-model-severity-applied #109)
  2. OpenAI excluded from moderator debate analysis ([Audit] #9 moderator-debate #110)
  3. Schema/jq enum mismatch for APPROVE_WITH_COMMENTS ([Audit] #10 moderator-resolution #111)
  4. tokens_used hardcoded to 0, truncated field missing in review-executed ([Audit] #18 review-executed #119)
  5. findings_removed hardcoded to 0 in praise-filtered ([Audit] #19 praise-filtered #120)
  6. No-op jq rule .high_findings_with_standards_ref >= 0 always true in severity-justified ([Audit] #21 severity-justified #122)
  7. commit_succeeded attested BEFORE git commit happens — records intent not outcome ([Audit] #13 resolver-fixes-committed #114)
  8. summary_comment_posted hardcoded to true — control provides no real assurance ([Audit] #14 resolver-threads-resolved #115)
  9. Shared KOSLI_API_TOKEN allows cross-flow attestation forgery ([Audit] #31 artifact-integrity-control #132)
  10. .kosli_ignore manipulation as supply chain attack vector ([Audit] #25 reviewed-code artifact identity #126, [Audit] #31 artifact-integrity-control #132)
  11. Shell injection via unquoted trail names in CI workflow ([Audit] #31 artifact-integrity-control #132)
  12. No human-in-the-loop on happy path — AI authors, reviews, fixes, ships ([Audit] #31 artifact-integrity-control #132)

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions