Skip to content

Commit 5dbc46d

Browse files
committed
chore: demo hardening, spire-fork sync, overlay cleanup
Major changes: - spire-fork: sync Go source (claims.go, plugin.go, client.go, attested_claims_extension.go) with compiled binaries — ensures fresh builds produce correct lah-bundle with workload-identity-agent-image-digest - spire-overlay: removed — consolidated into spire-fork (PR #197) - Demo scripts: improved test_agents.sh, test_control_plane.sh, test_integration.sh, test_onprem.sh reliability - WASM plugin: updated Envoy filter for lah-bundle parsing - Rust agent: geolocation_handler.rs improvements - Proto: updated sovereignattestation.proto definitions - Docs: added FAQ.md, CONTRIBUTING.md, LICENSE, SECURITY.md, demo screenshots, appendix tables - CI: updated workflow, build scripts cleaned up All integration tests pass on both demo hosts (10.1.0.10, 10.1.0.11).
1 parent 88e3697 commit 5dbc46d

File tree

162 files changed

+6723
-12474
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

162 files changed

+6723
-12474
lines changed

.github/workflows/ci.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,9 +149,9 @@ jobs:
149149
- name: Build SPIRE Components
150150
timeout-minutes: 10
151151
run: |
152-
echo "=== Building SPIRE with Overlay ==="
152+
echo "=== Building SPIRE from spire-fork/ ==="
153153
154-
# Use SPIRE overlay build system instead of building from fork
154+
# Build SPIRE from the committed spire-fork/ source tree
155155
if [ -f "build/spire-binaries/spire-server" ] && [ -f "build/spire-binaries/spire-agent" ]; then
156156
echo "SPIRE binaries already exist."
157157
else

.gitignore

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,3 +111,10 @@ build/spire-api-sdk/
111111
build/spire-binaries/
112112
build/BUILD_INFO.txt
113113
.spire-version
114+
115+
# Environment files
116+
**/.env
117+
**/.env.local
118+
**/.env.*.local
119+
**/.envrc
120+
!**/.env.example

README.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This transforms AI security from "Best-Effort" Zero-trust to **Privacy-First Ver
1010
![Figure 1: AegisSovereignAI Architecture Summary](images/readme-arch-new-summary.svg)
1111
*Figure 1: AegisSovereignAI Architecture Summary - Bridging Infrastructure, Identity, and Governance.*
1212

13-
**See the [Unified Identity Hybrid Cloud Proof of Concept (PoC) Guide](./hybrid-cloud-poc/README.md) for concrete use cases and detailed setup instructions.**
13+
**See the [Unified Identity Hybrid Cloud PoC](./hybrid-cloud-poc/README.md) — run `./run-demo.sh` to see the full trust chain in action (~7 min).**
1414

1515
## Enterprise Sovereign Use Cases (Focus: High-Security/Compliance Sectors e.g., Banking, Healthcare, Defense/Government)
1616

@@ -88,7 +88,7 @@ Edge nodes are often in untrusted physical locations, making them vulnerable to
8888
* **Data Minimization Proof:** Generates proofs validating that the dataset satisfies GDPR Data Minimization before entering the vector store.
8989
* **System Prompt Integrity (Pre-Computed):** At deployment, we generate a permanent cryptographic proof that the AI System Prompt includes mandatory safety guardrails (e.g., SSN redaction) and excludes unauthorized directives. This ensures "Compliance-by-Design" without exposing the proprietary prompt text.
9090
* **User Prompt Compliance (Batch & Purge):** User interactions are processed in real-time while a background process generates aggregated batch proofs. These proofs verify that no user prompts in a given window contained "jailbreak" commands or PII. Once the batch proof is successfully anchored to the enterprise audit log, the raw, high-liability prompts are purged from the system, permanently eliminating PII storage risk.
91-
* **AI Output Filtering (Batch & Purge):** AI model outputs are verified through real-time Data Loss Prevention (DLP) scanning and content safety checks before delivery. Batch proofs demonstrate that all outputs were properly filtered to prevent hallucinated PII leakage (e.g., fabricated SSNs). Raw outputs are purged after proof generation, ensuring zero retention of AI-generated sensitive data. See the [Privacy-Preserving Deep-Dive](./docs/auditor-privacy-preserving-deep-dive.md) for the complete three-track verification model.
91+
* **AI Output Filtering (Batch & Purge):** AI model outputs are verified through real-time Data Loss Prevention (DLP) scanning and content safety checks before delivery. Batch proofs demonstrate that all outputs were properly filtered to prevent hallucinated PII leakage (e.g., fabricated SSNs). Raw outputs are purged after proof generation, ensuring zero retention of AI-generated sensitive data. See the [Privacy-Preserving AI Governance](./docs/auditor-privacy-preserving-ai-governance.md) for the complete three-track verification model.
9292
* **Effective Challenge Enablement (SR 11-7):** Provides cryptographically-verifiable **independent evidence** for model validators: proof of execution hardware, data provenance, and governance policy adherence. This enables "Effective Challenge" of third-party (vendor) AI models even when source code access is restricted—validators can verify the *execution environment* and *compliance state* without needing to inspect proprietary model internals.
9393
* **Sovereign Tool Manifests (MCP Integration):** Uses Open Policy Agent (OPA) to filter the **Model Context Protocol (MCP)** `list_tools` response based on the agent's hardware-attested identity. This ensures agents only "discover" and execute tools they are explicitly hardware-authorized to use, creating a "Need-to-Know" environment for dynamic AI capabilities.
9494

@@ -136,18 +136,17 @@ AegisSovereignAI is designed to be framework-agnostic, serving as a secure execu
136136
* **[Auditor Guide](./docs/auditor.md)** - High-level overview of the attestation-linked evidence model covering the full AI lifecycle (Ingestion, Training, and Inference), verifiable geofencing (Reg-K), and identity binding. Includes the complete Evidence Bundle structure for regulatory reporting.
137137
* **[Privacy-Preserving Geolocation (Layer 2)](./docs/auditor-privacy-preserving-geolocation.md)** - Technical deep-dive on **privacy-preserving geofencing** for Reg-K/GDPR compliance, including ZKP vs. other PETs comparison, multi-sensor fusion, and SVID geolocation claims.
138138
* **[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-ai-governance.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
139-
* **[Threat Model: Unmanaged Device Security](./hybrid-cloud-poc/THREAT-MODEL-unmanaged-device.md)** - Analysis of **Infrastructure Blind Spots** on **BYOD/Unmanaged Devices**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
139+
* **[Threat Model: Runtime Perception Gap](./hybrid-cloud-poc/THREAT-MODEL-runtime-perception-gap.md)** - Analysis of **Infrastructure Blind Spots**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
140140
* **[Unified Identity Deep-Dive](./hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)** - Detailed technical architecture of the SPIRE/Keylime identity fusion model.
141141
* **[IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)** - Our contribution to standardizing verifiable geo-fences in multi-system environments.
142142

143143
## Quickstart
144144

145145
```bash
146-
# Clone and bootstrap the PoC environment
146+
# Clone and run the full demo (~7 min)
147147
git clone https://github.com/lfedgeai/AegisSovereignAI.git
148148
cd AegisSovereignAI/hybrid-cloud-poc
149-
./install_prerequisites.sh
150-
python ci_test_runner.py
149+
./run-demo.sh
151150
```
152151

153-
See the [Unified Identity Hybrid Cloud PoC Guide](./hybrid-cloud-poc/README.md) for detailed setup instructions.
152+
See the [Unified Identity Hybrid Cloud PoC](./hybrid-cloud-poc/README.md) for details.

docs/SPIRE_DEV_WORKFLOW.md

Lines changed: 0 additions & 237 deletions
This file was deleted.

docs/TPM_TESTING_CHECKLIST.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
- Linux machine with TPM 2.0 hardware
88
- SSH access to test machine
9-
- Clean checkout of the overlay branch
9+
- Clean checkout of the main branch
1010

1111
## Phase 1: Build Verification
1212

@@ -19,7 +19,7 @@ cd <PROJECT_ROOT>
1919
git fetch origin
2020
git checkout <BRANCH_NAME>
2121

22-
# Build SPIRE with overlay
22+
# Build SPIRE from spire-fork/
2323
./scripts/spire-build.sh
2424

2525
# Verify binaries
@@ -67,7 +67,7 @@ cd hybrid-cloud-poc
6767
--onprem-host <HOST>
6868

6969
# This will:
70-
# 1. Build SPIRE with overlay
70+
# 1. Build SPIRE from spire-fork/
7171
# 2. Start SPIRE server
7272
# 3. Start SPIRE agents with TPM attestation
7373
# 4. Run Keylime verification
@@ -227,7 +227,7 @@ See attached: tpm-test-evidence.tar.gz
227227

228228
## Conclusion
229229

230-
The SPIRE overlay system successfully performs hardware attestation
230+
The SPIRE fork-based build successfully performs hardware attestation
231231
on real TPM 2.0 hardware. Ready for upstream submission.
232232
```
233233

@@ -278,7 +278,7 @@ rm -rf build/
278278
go version # Should be 1.21+
279279

280280
# Install dependencies
281-
cd spire-overlay
281+
cd spire-fork
282282
go mod download
283283
```
284284

hybrid-cloud-poc/.gitignore

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
**/*.bak
2121
**/*.bak.*
2222
**/*~
23+
**/*.orig
2324

2425
# Log files
2526
**/*.log
@@ -53,3 +54,13 @@
5354
rust-keylime/target/
5455
*.rustc_info.json
5556
.future-incompat-report.json
57+
58+
# Generated certificates and keys (runtime artifacts)
59+
*.pem
60+
*.key
61+
*.crt
62+
*.csr
63+
svid-dump/
64+
65+
# Internal prep docs (not for open source)
66+
qa-cheatsheet.md

0 commit comments

Comments
 (0)