AI 에이전트에 로그뿐만 아니라 증명 체인이 필요한 이유
hackernews
|
|
📦 오픈소스
#command r
#오픈소스
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
Atlas는 승인된 보안 워크플로와 증거 유지 등을 위한 메타데이터 중심의 신뢰 제어 평면이며, 이를 위한 신뢰 인프라 모델과 문서를 제공합니다. Native Lab Toolkit 내에서 시작된 이 시스템은 운영자 상태와 증거를 파일 기반 트리에 저장하여 검사를 가능하게 합니다. Atlas는 자율적인 공격이나 파괴적 테스트 등에 사용해서는 안 되며, 범위 검사와 승인 절차를 준수해야 합니다.
본문
Atlas Trust Infrastructure is the public-facing trust model and documentation surface for Atlas: a metadata-first trust control plane for authorized security workflows, evidence retention, release trust, and business-flow proof. Atlas originated inside Native Lab Toolkit, a local-first, shell-native environment for authorized security assessment workflows. Native Lab Toolkit keeps operator state, target records, shared intel, evidence, findings, validation, reports, retention packets, and release trust artifacts in an inspectable file-backed tree. This public repository explains Atlas' trust infrastructure model, safety boundary, release evidence, business-flow evidence, and readiness language. The private atlas-lab-toolkit repository remains the implementation home for retained engineering context and operator runtime history. atlas is the main operator control plane. It does not replace the domain tools; it coordinates them: atlas : scope, operations, evidence, findings, validation, reports, retention, and release trustwiremap : reconnaissance, capture, and evidence interpretationvector : ranked action lanes, bounded validation, sessions, and outcomesintelctl : direct shared-intel inspectionlabctl : build, release, target, and administration workflows - New reader: docs/ATLAS_ONE_PAGE.md - Security operator: docs/OPERATOR_GUIDE.md - Business owner: docs/atlas/BUSINESS_FLOW_EVIDENCE.md - Release reviewer: docs/RELEASE_TRUST.md - SLSA reviewer: docs/atlas/SLSA_CLAIM.md - Contributor: CONTRIBUTING.md - Security reporter: SECURITY.md Run from the repository root: nix-shell ./bin/labctl status ./tools/atlas/bin/atlas doctor ./tools/atlas/bin/atlas v1 status --strict ./tools/atlas/bin/atlas production status --strict Full local QA: nix-shell --run './bin/dev-qa' Atlas is for authorized assessment orchestration only. Do not use it for autonomous exploitation, persistence, destructive testing, credential spraying, denial-of-service workflows, stealth/evasion behavior, or out-of-scope target expansion. Target-touching workflows should preserve scope checks, capability classification, operator intent, approval gates where required, ledger events, and evidence handling. Atlas can report production-ready under the local Atlas contract when all retained release evidence verifies for the current retained release commit: - v1 internal readiness is ready - repository state is clean and synced - release trust packet verification passes - release artifact manifest verification passes - production readiness contract exists - signing/provenance verifies through a retained public key - production dry-run evidence is retained Atlas has a SLSA-verifiable release artifact candidate path for GitHub-built artifacts: GitHub-hosted artifact attestation, official SLSA generic provenance, retained Atlas SLSA metadata, and verifier commands. This is not external audit, enterprise certification, SLSA certification, deployment certification, immutable storage, or tamper-proof infrastructure. CodeQL is used as an automated code scanning signal for tracked public source. It does not replace manual review, external audit, runtime testing, or Atlas' own retained trust-packet verification. ./bin/labctl status ./tools/atlas/bin/atlas doctor ./tools/atlas/bin/atlas v1 status --strict ./tools/atlas/bin/atlas production status --strict ./tools/atlas/bin/atlas target update --scope-status in-scope ./tools/atlas/bin/atlas op start --profile ./tools/atlas/bin/atlas web assess --scope-status in-scope ./tools/atlas/bin/atlas op trust-chain --strict ./tools/atlas/bin/atlas release packet --json --qa-status pass ./tools/atlas/bin/atlas release verify | Start Here | Purpose | |---|---| | docs/INDEX.md | Documentation map for new reviewers. | | docs/ATLAS_ONE_PAGE.md | One-page Atlas explanation. | | docs/OPERATOR_GUIDE.md | End-to-end operator workflow. | | docs/demo/DEMO_OPERATION.md | Synthetic metadata-only demo operation. | | docs/COMMAND_REFERENCE.md | Full command reference moved out of the README. | | docs/TRUST_LIFECYCLE.md | Scope-to-release trust chain explanation. | | docs/case-studies/CASE_STUDY_RELEASE_TRUST.md | Public release-trust case study. | | docs/case-studies/CASE_STUDY_VENDOR_PAYMENT_CHANGE.md | Public business-flow case study. | | docs/atlas/TRUST_INFRASTRUCTURE_DIRECTION.md | Atlas trust-infrastructure direction. | | docs/atlas/TRUST_OBJECT_MODEL.md | Actors, objects, packets, schemas, freshness, verification, and replay. | | docs/RELEASE_TRUST.md | Release packets, verification, replay, signing, and provenance. | | docs/atlas/SLSA_PROVENANCE.md | GitHub/Sigstore SLSA provenance workflow and verification contract. | | docs/atlas/SLSA_CLAIM.md | Bounded SLSA-verifiable release artifact claim and evidence checklist. | | docs/atlas/V1_INTERNAL_RC.md | Atlas v1 Internal Release Candidate scope and verification checklist. | | docs/atlas/RELEASE_ARTIFACT_MANIFEST.md | Release artifact manifest contract and completeness checks. | | docs/WEB_ASSESSMENT.md | atlas web assess flow and boundaries. | | docs/atlas/BUSINESS_FLOW_EVIDENCE.md | Optional metadata-only business-flow evidence model, retention links, packet path, assurance view, trust-chain view, verification, and non-blocking readiness integration. | | docs/atlas/V1_PILLAR_READINESS.md | v1 pillar readiness contract. | | docs/atlas/PRODUCTION_READINESS.md | Local production readiness contract. | | docs/TRUST_MODEL.md | Trust model and verification pattern. | | docs/SECURITY_MODEL.md | Safety model, tiers, and allowed boundaries. | | docs/RESPONSIBLE_USE.md | Responsible-use policy. | | docs/KNOWN_LIMITATIONS.md | Current limitations and language boundaries. | | docs/CI.md | GitHub Actions and local QA parity. | | SECURITY.md | Public vulnerability reporting and authorized-use boundary. | | CONTRIBUTING.md | Contribution rules, QA expectations, and no-secrets policy. | The development shell provides the expected local toolchain, including bats , git , gpg , jq , rg , shellcheck , and shfmt . Common development gates: ./bin/dev-fmt ./bin/dev-lint ./bin/dev-test ./bin/dev-stress ./bin/dev-qa Before treating a change as complete, run the strongest relevant gate and keep the repo clean and synced.
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유